Abstract
No abstract available.
Cited By
- Dadeau F, Giorgetti A, Bouquet F and Enderlin I (2018). Contract-based testing for PHP with Praspel, Journal of Systems and Software, 136:C, (209-222), Online publication date: 1-Feb-2018.
- Keil M and Thiemann P (2013). Efficient dynamic access analysis using JavaScript proxies, ACM SIGPLAN Notices, 49:2, (49-60), Online publication date: 5-Feb-2014.
- Geffken M and Thiemann P Side effect monitoring for Java using bytecode rewriting Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java platform: Virtual machines, Languages, and Tools, (87-98)
- Keil M and Thiemann P Efficient dynamic access analysis using JavaScript proxies Proceedings of the 9th symposium on Dynamic languages, (49-60)
- Heidegger P, Bieniusa A and Thiemann P (2012). Access permission contracts for scripting languages, ACM SIGPLAN Notices, 47:1, (111-122), Online publication date: 18-Jan-2012.
- Heidegger P, Bieniusa A and Thiemann P Access permission contracts for scripting languages Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (111-122)
- Bierhoff K Automated program verification made SYMPLAR Proceedings of the 10th SIGPLAN symposium on New ideas, new paradigms, and reflections on programming and software, (19-32)
- de Caso G, Garbervetsky D and Gorín D Pest Proceedings of the 1st Workshop on Developing Tools as Plug-ins, (5-8)
- Kerfoot E and McKeever S Checking concurrent contracts with aspects Proceedings of the 2010 ACM Symposium on Applied Computing, (2523-2530)
- Mustafa T, Drouineaud M and Sohr K Towards formal specification and verification of a role-based authorization engine using JML Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, (50-57)
- Balz M and Goedicke M Embedding process models in object-oriented program code Proceedings of the 1st Workshop on Behaviour Modelling in Model-Driven Architecture, (1-7)
- Kerfoot E, McKeever S and Torshizi F Deadlock freedom through object ownership International Workshop on Aliasing, Confinement and Ownership in Object-Oriented Programming, (1-8)
- Moskal M Programming with triggers Proceedings of the 7th International Workshop on Satisfiability Modulo Theories, (20-29)
- Lloyd J and Jürjens J Security Analysis of a Biometric Authentication System Using UMLsec and JML Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems, (77-91)
- Bidoit M and Hennicker R An Algebraic Semantics for Contract-Based Software Components Proceedings of the 12th international conference on Algebraic Methodology and Software Technology, (216-231)
- Janota M, Grigore R and Moskal M Reachability analysis for annotated code Proceedings of the 2007 conference on Specification and verification of component-based systems: 6th Joint Meeting of the European Conference on Software Engineering and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, (23-30)
- Dadeau F, Ledru Y and Du Bousquet L Directed random reduction of combinatorial test suites Proceedings of the 2nd international workshop on Random testing: co-located with the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), (18-25)
- Bianculli D and Ghezzi C Monitoring conversational web services 2nd international workshop on Service oriented software engineering: in conjunction with the 6th ESEC/FSE joint meeting, (15-21)
- Bierhoff K and Aldrich J Modular typestate checking of aliased objects Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications, (301-320)
- Bierhoff K and Aldrich J (2007). Modular typestate checking of aliased objects, ACM SIGPLAN Notices, 42:10, (301-320), Online publication date: 21-Oct-2007.
- Leino K and Schulte W Using history invariants to verify observers Proceedings of the 16th European Symposium on Programming, (80-94)
- Müller P, Poetzsch-Heffter A and Leavens G (2006). Modular invariants for layered object structures, Science of Computer Programming, 62:3, (253-286), Online publication date: 15-Oct-2006.
- Cheon Y and Kim M A specification-based fitness function for evolutionary testing of object-oriented programs Proceedings of the 8th annual conference on Genetic and evolutionary computation, (1953-1954)
- Simons A and Fernandez C Using Alloy to model-check visual design notations Proceedings of the Sixth Mexican International Conference on Computer Science, (121-128)
- Leavens G, Cheon Y, Clifton C, Ruby C and Cok D (2005). How the design of JML accommodates both runtime assertion checking and formal verification, Science of Computer Programming, 55:1-3, (185-208), Online publication date: 1-Mar-2005.
- Dupuy-Chessa S, du Bousquet L, Bouchet J and Ledru Y Test of the ICARE platform fusion mechanism Proceedings of the 12th international conference on Interactive Systems: design, specification, and verification, (102-113)
- Dufay G, Felty A and Matwin S Privacy-sensitive information flow with JML Proceedings of the 20th international conference on Automated Deduction, (116-130)
- Edwards S, Sitaraman M, Weide B and Hollingsworth J (2004). Contract-Checking Wrappers for C++ Classes, IEEE Transactions on Software Engineering, 30:11, (794-810), Online publication date: 1-Nov-2004.
- Van Der Aalst W (2003). Inheritance of Interorganizational Workflows, Information Technology and Management, 4:4, (345-389), Online publication date: 1-Oct-2003.
- McCamant S and Ernst M Predicting problems caused by component upgrades Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (287-296)
- McCamant S and Ernst M (2003). Predicting problems caused by component upgrades, ACM SIGSOFT Software Engineering Notes, 28:5, (287-296), Online publication date: 1-Sep-2003.
- Kilov H and Baclawski K 11th OOPSLA workshop on behavioral semantics Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (76-77)
- Müller P (2002). Modular specification and verification of object-oriented programs, 10.5555/1767748, Online publication date: 1-Jan-2002.
- Ruby C and Leavens G Safely creating correct subclasses without seeing superclass code Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (208-228)
- Ruby C and Leavens G (2000). Safely creating correct subclasses without seeing superclass code, ACM SIGPLAN Notices, 35:10, (208-228), Online publication date: 1-Oct-2000.
- Leavens G, Ruby C, Leino K, Poll E and Jacobs B JML (poster session) Addendum to the 2000 proceedings of the conference on Object-oriented programming, systems, languages, and applications (Addendum), (105-106)
- Pons C, Giandini R and Baum G Dependency Relations between Models in the Unified Process Proceedings of the 10th International Workshop on Software Specification and Design
- Kilov H Business Specifications and RD-ODP Proceedings of the Technology of Object-Oriented Languages and Systems (TOOLS 34'00)
Recommendations
Digital Businesses: Creation of a Research Framework for Organizational Readiness for Enterprise 2.0
Customers are no longer at the receiving end in the new digital economies. They have a say in everything and are co-creating products and services. Their connection with other customers is stronger and the influence they exert collectively on businesses ...