Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Ghaith Haddad"'
Autor:
Gary T. Leavens, Ghaith Haddad
Publikováno v:
Concurrency and Computation: Practice and Experience. 25:2290-2306
SUMMARY Real-time and safety-critical code could benefit from the use of design patterns and frameworks that rely on subtyping and dynamic dispatch. However, modular reasoning about programs that use subtypes requires that each overriding method obey
Autor:
Johan H. Enslin, Carolyn David, Mohammad Kuran, Ghaith Haddad, Abbas Ali Akhil, Scott S. Kuszmaul, Lisa Sena-Henderson, Sigifredo Gonzalez, Hussam Alatrash, Evlyn Mark, Richard G. Stuby, Ruba Akram Amarin, Ronald Hamaoui, K. Rustom, Ward Bower
Initiated in 2008, the SEGIS initiative is a partnership involving the U.S. DOE, Sandia National Laboratories, private sector companies, electric utilities, and universities. Projects supported under the initiative have focused on the complete-system
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3b6afea8a92f17dd4357108226cacd78
https://doi.org/10.2172/1039015
https://doi.org/10.2172/1039015
Autor:
Ghaith Haddad, Gary T. Leavens
Publikováno v:
JTRES
Modular reasoning about programs that use subtypes requires that an overriding method in a subtype obeys the specifications of all methods that it overrides. For example, if method m is specified in a supertype T to take at most 42 nanoseconds to exe
Publikováno v:
JTRES
Safety-Critical Java (SCJ) is a dialect of Java that allows programmers to implement safety-critical systems, such as software to control airplanes, medical devices, and nuclear power plants. SafeJML extends the Java Modeling Language (JML) to allow
Publikováno v:
PLPV
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for the program verification community as software errors can have catastrophic consequences. Unfortunately, it is nearly impossible to find representative
Publikováno v:
ACM SIGPLAN Notices. 44:7-8
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for the program verification community as software errors can have catastrophic consequences. Unfortunately, it is nearly impossible to find representative