You are here
Home > Technique

Download ACM transactions on software engineering and methodology by Jonathan E. Cook and Alexander L. Wolf on software process PDF

By Jonathan E. Cook and Alexander L. Wolf on software process validation, Premkumar T. Devanbu on GENOA Peter J. McCann and G-C Roman on modeling mobile IP in Mobile UNITY

Significant experiences via best foreign computing device scientists and software program engineers.

Show description

Read Online or Download ACM transactions on software engineering and methodology (April) PDF

Best technique books

Additional resources for ACM transactions on software engineering and methodology (April)

Example text

The review of Campos and Harrison [1997]). For instance, HOL, a higher order logic theorem prover, has been used by Bumbulis et al. [1996] to verify user interface specifications. Because of the equivalent expressiveness of the formalism used in the analysis and of the specification language, properties may be studied on the original specification rather than on its approximation. However, theorem proving usually requires complex user interaction to derive the proof, which may be overkill for many properties that could be checked automatically by model checkers.

A dialog is modal when it has priority over the other active dialogs. For instance, a window notifying an error must block the execution of the other components of the GUI until the user clicks the “Ok” button. Modal dialogs may also be specified in VEG, by using the keyword Modal model. To improve performance, also hidden models may be specified, that is, models whose creation and destruction is only apparent. An instance of a model declared hidden is created when its container GUI starts its execution.

2. SEMANTICS OF VEG We describe here an operational semantics of VEG applications. A VEG application is composed of various VEG objects, that is, instances of models. Each VEG object, during its lifetime, has a current local state, and has a unique object identifier, called its reference. The application has one unbounded event queue where communication events are stored. , one or more object references or the special keyword any to denote any target) and event is the event name. There is also a channel for input events, which are not buffered.

Download PDF sample

Rated 4.97 of 5 – based on 23 votes
Top