咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 10 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 5 篇 软件工程
    • 4 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 信息与通信工程
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 14 篇 program modifica...
  • 2 篇 program synthesi...
  • 2 篇 software reuse
  • 2 篇 transformations
  • 2 篇 program verifica...
  • 1 篇 program debuggin...
  • 1 篇 object oriented ...
  • 1 篇 verification of ...
  • 1 篇 derivation of pr...
  • 1 篇 abuse
  • 1 篇 functional dista...
  • 1 篇 component-based ...
  • 1 篇 structured progr...
  • 1 篇 scripting langua...
  • 1 篇 programmable log...
  • 1 篇 frameworks
  • 1 篇 schemata
  • 1 篇 object oriented ...
  • 1 篇 s-expressions
  • 1 篇 program slicing

机构

  • 1 篇 natl univ irelan...
  • 1 篇 univ salerno dip...
  • 1 篇 department of el...
  • 1 篇 at&t bell labs m...
  • 1 篇 department of ap...
  • 1 篇 stanford artific...
  • 1 篇 artificial intel...
  • 1 篇 stanford artific...
  • 1 篇 univ texas dept ...
  • 1 篇 kaunas universit...
  • 1 篇 univ newcastle u...
  • 1 篇 tottori univ gra...
  • 1 篇 univ ottawa dept...
  • 1 篇 virginia tech ct...
  • 1 篇 waseda univ sch ...
  • 1 篇 artificial intel...
  • 1 篇 virginia tech de...
  • 1 篇 reshetnev siberi...

作者

  • 2 篇 manna zohar
  • 1 篇 ramakrishnan nar...
  • 1 篇 gimson rb
  • 1 篇 coppola jolanda
  • 1 篇 subbotin n. a.
  • 1 篇 kawamura takao
  • 1 篇 waters rc
  • 1 篇 ribbens calvin j...
  • 1 篇 gerbasio diego
  • 1 篇 štuikys vytautas
  • 1 篇 raymond j
  • 1 篇 klass van schelv...
  • 1 篇 kang pilsung
  • 1 篇 kuto kuniaki
  • 1 篇 rotenstreich s
  • 1 篇 dershowitz nachu...
  • 1 篇 chiacchio pasqua...
  • 1 篇 damaševičius rob...
  • 1 篇 henderson p
  • 1 篇 maruyama k

语言

  • 11 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=PROGRAM MODIFICATION"
14 条 记 录,以下是1-10 订阅
排序:
Application of verification method and a decomposition method to program modification
收藏 引用
SYSTEMS AND COMPUTERS IN JAPAN 1996年 第1期27卷 12-26页
作者: Ono, K Maruyama, K Fukuzawa, Y WASEDA UNIV SCH SCI & ENGN TOKYO 169 JAPAN
This paper considers the case where the specification and the program are modified. A method is proposed that specifies the range which is affected by the modification using the verification method and decomposition t... 详细信息
来源: 评论
The Evolution of programs: Automatic program modification
收藏 引用
IEEE Transactions on Software Engineering 1977年 第6期SE-3卷 377-385页
作者: Dershowitz, Nachum Manna, Zohar Stanford Artificial Intelligence Laboratory Department of Computer Science Stanford University Stanford CA 94305 United States
An attempt is made to formulate techniques of program modification, whereby a given program that achieves one goal can be transformed into a new program that uses the same principles to achieve a different goal. For e... 详细信息
来源: 评论
Technique of Verified program Module modification with Algorithm Preservation  11
Technique of Verified Program Module Modification with Algor...
收藏 引用
11th International IEEE Scientific and Technical Conference on Dynamics of Systems, Mechanisms and Machines (Dynamics)
作者: Subbotin, N. A. Lubkin, I. A. Reshetnev Siberian State Aerosp Univ Krasnoyarsk Russia
Currently, there are many tools that modify the program code of the compiled protected modules. The authors of the considered tools do not publish technique of embedding their protection system and any proofs of their... 详细信息
来源: 评论
ORTHOGONAL LANGUAGES - A FRAMEWORK FOR program-DEVELOPMENT
收藏 引用
COMPUTER LANGUAGES 1992年 第2期17卷 83-100页
作者: ROTENSTREICH, S Department of Electrical Engineering and Computer Science The George Washington University Washington DC 20052 U.S.A.
Debugging, performance measurement, program testing, visualization and program modifications are some of the activities undertaken during program development. Since these activities require programming, this paper pro... 详细信息
来源: 评论
Adaptive Code Collage: A Framework to Transparently Modify Scientific Codes
收藏 引用
COMPUTING IN SCIENCE & ENGINEERING 2012年 第1期14卷 52-63页
作者: Kang, Pilsung Ramakrishnan, Naren Ribbens, Calvin J. Varadarajan, Srinidhi Heffner, Michael A. Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA Virginia Tech Ctr High End Comp Syst Blacksburg VA 24061 USA
Legacy scientific codes are often repurposed to fit adaptive needs, but making such code adaptive without changing the original source programs can be challenging. Adaptive Code Collage (ACC) meets this challenge usin... 详细信息
来源: 评论
Towards a formal framework for software reuse
收藏 引用
INFORMATION SCIENCES 1998年 第3-4期110卷 135-149页
作者: Mili, R Raymond, J Univ Texas Dept Comp Sci Richardson TX 75083 USA Univ Ottawa Dept Comp Sci Ottawa ON K1N 6N5 Canada
It is reasonable to expect that the use of formal methods in software reuse will help improve the practice of this discipline as well as enhance our understanding of its products and processes. We have identified the ... 详细信息
来源: 评论
Reusing analogous components
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 1997年 第2期9卷 341-349页
作者: Cheng, BHC Jeng, JJ AT&T BELL LABS MIDDLETOWNNJ 07748
Using formal specifications to represent software components facilitates the determination of reusability because they more precisely characterize the functionality of the software, and the well-defined syntax makes p... 详细信息
来源: 评论
MODULARIZATION OF LARGE programS
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 1981年 第5期11卷 497-520页
作者: HENDERSON, P GIMSON, RB NATL UNIV IRELAND UNIV COLL DUBLIN DEPT COMPUTING SCIDUBLINIRELAND UNIV NEWCASTLE UPON TYNE COMPUTING LABNEWCASTLE TYNE NE1 7RUTYNE & WEARENGLAND
This report describes a macroprocessor, ‘Supermac’, and its use for modularization of large programs. The development of the macroprocessor and its application to program modularization was undertaken in a research ... 详细信息
来源: 评论
THE programMERS APPRENTICE - KNOWLEDGE BASED program EDITING
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1982年 第1期8卷 1-12页
作者: WATERS, RC Artificial Intelligence Laboratory Massachusetts Institute of Technology
An interactive programming aid called the programmer's apprentice (PA) has been developed. The intention is that the programmer will do the hard parts of design and implementation, while PA will supply all routine... 详细信息
来源: 评论
program Conversion for the Protection of Personal Information
Program Conversion for the Protection of Personal Informatio...
收藏 引用
15th IEEE International Conference on High Performance Computing and Communications (HPCC) /11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
作者: Kuto, Kuniaki Takahashi, Kenichi Kawamura, Takao Sugahara, Kazunori Tottori Univ Grad Sch Engn Dept Elect & Informat Tottori 6808550 Japan
Some of Internet services request us to provide our personal information. When we use their services, we have to provide our personal information even if we cannot trust their service providers. This may cause the abu... 详细信息
来源: 评论