Filters








444,796 Hits in 5.4 sec

KeY: A Formal Method for Object-Oriented Systems [chapter]

Wolfgang Ahrendt, Bernhard Beckert, Reiner Hähnle, Peter H. Schmitt
2007 Lecture Notes in Computer Science  
This paper gives an overview of the KeY approach and highlights the main features of the KeY system. KeY is an approach (and a system) for the deductive verification of object-oriented software.  ...  The intention is to provide a platform that allows close collaboration of conventional and formal software development methods.  ...  This means that KeY provides a common tool and conceptual base for developers and formal methods specialists.  ... 
doi:10.1007/978-3-540-72952-5_2 fatcat:ulq2gvp7yjdkrf5zyjat3xqnwy

On Key Symbols

Sherry B. Ortner
1973 American Anthropologist  
‘‘stands for” the system as a whole.  ...  Here I have simply been concerned to show that, al- though a method of cultural analysis via key symbols has been for the most part un- articulated, there is at least incipiently method in such analysis  ... 
doi:10.1525/aa.1973.75.5.02a00100 fatcat:5dqiyios55abrh5zgyvcjxxqgq

The KeY tool

Wolfgang Ahrendt, Thomas Baar, Bernhard Beckert, Richard Bubel, Martin Giese, Reiner Hähnle, Wolfram Menzel, Wojciech Mostowski, Andreas Roth, Steffen Schlager, Peter H. Schmitt
2005 Journal of Software and Systems Modeling  
Using the KeY tool, formal methods and object-oriented development techniques are applied in an integrated manner.  ...  The target language of KeY based development is Java Card DL, a proper subset of Java for smart card applications and embedded systems.  ...  We also thank the reviewers for pointing out a number of inaccuracies and additional references.  ... 
doi:10.1007/s10270-004-0058-x fatcat:bhaebuosyndkfjhhjc4pqnypju

PG-Keys: Keys for Property Graphs

Renzo Angles, Angela Bonifati, Stefania Dumbrava, George Fletcher, Keith W. Hare, Jan Hidders, Victor E. Lee, Bei Li, Leonid Libkin, Wim Martens, Filip Murlak, Josh Perryman (+5 others)
2021 Proceedings of the 2021 International Conference on Management of Data  
Our result is PG-Keys, a flexible and powerful framework for defining key constraints, which fulfills the above goals.  ...  The main purposes of keys are enforcing data integrity and allowing the referencing and identifying of objects.  ...  For example, a key in the relational model is a set of attributes whose values are used to identify tuples inside a table [2] ; in object-oriented data models, object identity is achieved by equipping  ... 
doi:10.1145/3448016.3457561 fatcat:4shyfqzz3nbzvmnyrj7r6db7hu

Software Evolution as the Key to Productivity [chapter]

Oscar Nierstrasz
2004 Lecture Notes in Computer Science  
We begin with some assertions that are intended as food for thought. We continue by reviewing what we consider to be some of the key difficulties with software development today.  ...  Despite the existence of a seemingly continuous stream of new technologies and methods, software productivity remains universally unimpressive.  ...  Markus Gaelli and the anonymous reviewers for various suggestions and corrections.  ... 
doi:10.1007/978-3-540-24626-8_19 fatcat:f4rbuhmuafa5fb65j3vdj2ie6y

Key Concepts, Definitions and Assumptions [chapter]

Madhu Singh
2015 Technical and Vocational Education and Training: Issues, Concerns and Prospects  
Beginning with a discussion of the key dimensions of lifelong learning, it then clarifies the terms formal, non-formal and informal learning; and system-wide or top-down and individual or bottom-up approaches  ...  ; 4. the importance of levels of learning below upper secondary schooling; 5. the distinctions between types of non-formal learning; 6. the potential for enhanced informal learning in the South through  ...  On the one hand, APL tends to have a higher education focus and is established as a method of recognising non-formal (experiential) learning for individuals with relevant knowledge and experience who have  ... 
doi:10.1007/978-3-319-15278-3_2 fatcat:4bpqgi5lpzczfj6odtmrgenia4

The Key System: Integrating Object-Oriented Design and Formal Methods [chapter]

Wolfgang Ahrendt, Thomas Baar, Bernhard Beckert, Martin Giese, Elmar Habermalz, Reiner Hähnle, Wolfram Menzel, Wojciech Mostowski, Peter H. Schmitt
2002 Lecture Notes in Computer Science  
The KeY system consists of a commercial CASE tool enhanced with functionality for formal specification and deductive verification.  ...  This paper gives a brief description of the KeY system, a tool written as part of the ongoing KeY project 1 , which is aimed at bridging the gap between (a) OO software engineering methods and tools and  ...  Special features of KeY are: -We concentrate on object-oriented analysis and design methods (OOAD)because of their key role in today's software development practice -, and on Java as the target language  ... 
doi:10.1007/3-540-45923-5_23 fatcat:7s5ubpggurd5ln2su5emkpic2u

KWIC (key word in context)

1984 The Journal of Logic Programming  
Model to Efficient Compilation of Patterns [166]From Abstract PROLOG Instruction Set [672]An Abstract PROLOG Machine-a Specification [383] Abstract PROLOG Machine and its Application to Partial Evaluation  ...  198]Modularization and Abstraction in Logic Programming [199]Modularization and Abstraction in PROLOG/KR [439]Data Acceptability of FGCS [534]New Applications: User and Social Access to PROLOG Database Systems  ...  5561 Object Oriented Programming in Concurrent PROLOG ]5571 Object-oriented Programming in PROLOG [716] Observed [366]Operational Algebraic Semantics of PROLOG Programs [152]An Operational and Denotational  ... 
doi:10.1016/0743-1066(84)90025-6 fatcat:ypq2jrr3mvd3hflnp6ftrcd5vm

Key characteristics of specular stereo

A. A. Muryy, R. W. Fleming, A. E. Welchman
2014 Journal of Vision  
As a result, specular reflections pose substantial problems for binocular stereopsis.  ...  Here we use a combination of computer graphics and geometrical analysis to characterize the key respects in which specular stereo differs from standard stereo, to identify how and why the human visual  ...  Establishing stereo correspondence for specular objects using a correlation method.  ... 
doi:10.1167/14.14.14 pmid:25540263 pmcid:PMC4278431 fatcat:j2l6ypwhjjhk5ir6o3uhc5sfvu

Communication is the Key Skill for Reference Librarians

Christina K Pikas
2007 Evidence Based Library and Information Practice  
To aid self-help situations, the author recommends better subject description of resources and inquiry-oriented instead of object-oriented systems.  ...  At minimum the system should request the user state his objective, if for no other reason than to force the user to reflect on or analyze his question.  ...  To aid self-help situations, the author recommends better subject description of resources and inquiry-oriented instead of object-oriented systems.  ... 
doi:10.18438/b84p5s fatcat:wbcovodzgvhhvecdyfuni6zdge

Usability: Key characteristic of software quality

Nebojsa Djordjevic
2017 Vojnotehnički Glasnik  
At the beginning of the paper, a retrospective of formal definitions of usability is given in order to show the evolution of views on usability for more than three decades.  ...  The paper emphasizes the importance of software usability as a key quality characteristic of software during its use.  ...  Today, there are numerous methods for assessing usability. As a result, there is the question of choice of the most appropriate method for assessing the usability of a particular software product.  ... 
doi:10.5937/vojtehg65-11028 fatcat:rlbddip5wfh4rllmpkmhssvzzu

Linear Software Models: Key Ideas [article]

Iaakov Exman
2015 arXiv   pre-print
It has appeared in a series of papers dealing with various aspects of the theory. But one was lacking a single source for its key ideas.  ...  Matrix is defined - square and block-diagonal - enabling designs comparison for any software systems in a Software Design Laboratory.  ...  General Object Oriented Software -These include the OMG Unified Modelling Language (UML) specification [22] , a well-known overview book on UML [2] and the classical GoF book on Design Patterns [14  ... 
arXiv:1510.04652v1 fatcat:yuas3mmhuzderdcavowzcekd5m

Symmetric Groups of Authentications and Key Management with Session Based Automated Key Updation

K. Gunalan
2019 International Journal for Research in Applied Science and Engineering Technology  
Authenticated key exchange (AKE) is one of the most important applications in applied cryptography, where a user interacts with a server to set up a session key where pre-registered information (aka. authentication  ...  To overcome the security issues proposed method implements textual, graphical, and biometric and device password to access the user accounts and an efficient AES algorithm for data transaction which is  ...  The objectives in the input design are, To produce a cost efficient method of input. To achieve a highest possible level of accuracy.  ... 
doi:10.22214/ijraset.2019.4660 fatcat:5pyoosltsfcvtlidpck4rrymcq

History-based specification and verification of Java collections in KeY (keynote)

Frank S. de Boer, Hans-Dieter A. Hiep
2020 Proceedings of the 22nd ACM SIGPLAN International Workshop on Formal Techniques for Java-Like Programs  
The state-of-the-art KeY system can be used to formally reason about program correctness of Java programs. Recently, KeY has been used to show major flaws in the Java Collection Framework.  ...  This lecture discussed a new history-based specification method for reasoning about the correctness of clients and arbitrary implementations of interfaces, and the Collection interface in particular.  ...  The functioning of a system relies for a large part on its used software libraries.  ... 
doi:10.1145/3427761.3432349 fatcat:ti2f3shii5hfllw7k3nrmy5zea

Key Course Group Construction of Intelligent Manufacturing for Applied

Zhuqiao Ma
2021 Scientific and Social Research  
This article mainly expounds the intelligent manufacturing theory basis and technology foundation course group construction in the important role of applied undergraduate professional curriculum system  ...  taught content at the same time, the core courses and practical application of the teaching content to construct, and explore the construction conform to the concept of the new era of smart manufacturing key  ...  Prevent training from becoming a mere formality.  ... 
doi:10.36922/ssr.v3i4.1198 fatcat:fpgbosowbrb2xhrq32ahonxf7q
« Previous Showing results 1 — 15 out of 444,796 results