This paper considers the case where the specification and the program are modified. A method is proposed that specifies the range which is affected by the modification using the verification method and decomposition t...
详细信息
This paper considers the case where the specification and the program are modified. A method is proposed that specifies the range which is affected by the modification using the verification method and decomposition technique. By the proposed technique, the points where the modification is required or the point which may contain an error can be estimated when the program is modified. The inductive assertion is used as the verification technique. It is assumed that the specification before modification as well as the program are already verified for the correctness. The object of verification is simplified by the comparison and validation of the verification history and the object of correctness verification. The part which is left without being simplified is the range affected by the modification before the comparison and after the correctness verification, the rage which is affected by the modification as well as the range for which the validation is not satisfies can be specified.
An attempt is made to formulate techniques of program modification, whereby a given program that achieves one goal can be transformed into a new program that uses the same principles to achieve a different goal. For e...
详细信息
Currently, there are many tools that modify the program code of the compiled protected modules. The authors of the considered tools do not publish technique of embedding their protection system and any proofs of their...
详细信息
ISBN:
(纸本)9781538618219;9781538618202
Currently, there are many tools that modify the program code of the compiled protected modules. The authors of the considered tools do not publish technique of embedding their protection system and any proofs of their tools' algorithm correctness. This article describes the technique of program module modification with algorithm preservation for the subsequent embedding a protection system. The article suggests the verification technique for automated test of modification correctness and describes developed verification system based on this technique. The results of the work are the technique of program module modification and the verification tool for testing its correctness.
Debugging, performance measurement, program testing, visualization and program modifications are some of the activities undertaken during program development. Since these activities require programming, this paper pro...
详细信息
Debugging, performance measurement, program testing, visualization and program modifications are some of the activities undertaken during program development. Since these activities require programming, this paper proposes a language, called an Orthogonal Language, that can be used to write both regular programs and development activities programs. An orthogonal language contains the regular programming language but must also have features that may not be in a regular language such as concurrency, exception handling and access to the run-time environment. Despite the added features, the orthogonal language is almost identical to the regular language. Development activities are programmed as fragments of programs that are inserted interactively into a regular program being developed. Fragments are supported by an extension of the scope and visibility rules of the regular language. Translation rules merge fragments into the executable image of the regular program without changing the source of the regular program. The source of fragments is also maintained.
Legacy scientific codes are often repurposed to fit adaptive needs, but making such code adaptive without changing the original source programs can be challenging. Adaptive Code Collage (ACC) meets this challenge usin...
详细信息
Legacy scientific codes are often repurposed to fit adaptive needs, but making such code adaptive without changing the original source programs can be challenging. Adaptive Code Collage (ACC) meets this challenge using function-call interception in a language-neutral way at link time, transparently "catching" and redirecting function calls.
It is reasonable to expect that the use of formal methods in software reuse will help improve the practice of this discipline as well as enhance our understanding of its products and processes. We have identified the ...
详细信息
It is reasonable to expect that the use of formal methods in software reuse will help improve the practice of this discipline as well as enhance our understanding of its products and processes. We have identified the following technical activities that Cake place in software reuse as candidates for a formal modeling: representing reusable assets, representing reuse queries, defining matching criteria, defining a storage structure, deriving measures of distance and deriving a calculus of program modification. In this paper we discuss how a simple mathematical model based on set theory and relation theory allows us to capture these activities in a unified, coherent framework. (C) 1998 Elsevier Science Inc. All rights reserved.
Using formal specifications to represent software components facilitates the determination of reusability because they more precisely characterize the functionality of the software, and the well-defined syntax makes p...
详细信息
Using formal specifications to represent software components facilitates the determination of reusability because they more precisely characterize the functionality of the software, and the well-defined syntax makes processing amenable to automation. This paper presents an approach, based on formal methods, to the search, retrieval, and modification of reusable software components. From a two-tiered hierarchy of reusable software components, the existing components that are analogous to the query specification are retrieved from the hierarchy. The specification for an analogous retrieved component is compared to the query specification to determine what changes need to be applied to the corresponding program component in order to make it satisfy the query specification.
This report describes a macroprocessor, ‘Supermac’, and its use for modularization of large programs. The development of the macroprocessor and its application to program modularization was undertaken in a research ...
详细信息
This report describes a macroprocessor, ‘Supermac’, and its use for modularization of large programs. The development of the macroprocessor and its application to program modularization was undertaken in a research project sponsored by GEC Telecommunications, Coventry, and this document forms the final report of that project. The project arose from the wish to be able to structure large pieces of software, written in a conventional programming language, in order to make them more easily understood and hence more easily constructed, maintained and modified. In this report the use of the specially developed Supermac macroprocessor to achieve better structured programs will be described in detail. A full definition of the Supermac notation.
An interactive programming aid called the programmer's apprentice (PA) has been developed. The intention is that the programmer will do the hard parts of design and implementation, while PA will supply all routine...
详细信息
An interactive programming aid called the programmer's apprentice (PA) has been developed. The intention is that the programmer will do the hard parts of design and implementation, while PA will supply all routine elements. The current version of PA is composed of 5 parts: 1. an analyzer that can construct the plan for a program, 2. a coder that can create program text corresponding to the plan, 3. a drawer that can draw a graphical representation of the plan, 4. a library of plans for common algorithmic fragments, and 5. a plan editor that makes it possible for a programmer to modify a program by modifying its plan.
Some of Internet services request us to provide our personal information. When we use their services, we have to provide our personal information even if we cannot trust their service providers. This may cause the abu...
详细信息
ISBN:
(纸本)9780769550886
Some of Internet services request us to provide our personal information. When we use their services, we have to provide our personal information even if we cannot trust their service providers. This may cause the abuse of their personal information. Therefore, we propose a framework that prevents service providers from abusing users' personal information. In our framework, a user selects a method to use his/her information, and compels the service provider to use the method. Since the personal information is used through the method selected by the user, the user is able to prevent the service provider from the abuse of his/her personal information. Thus, the user can relief to provide his/her personal information to the service provider. We have some problems to be solved for the realization of our framework. In this paper, we discuss a way to install a method selected by a user into a program a service provider has.
暂无评论