The Alphard 'form' provides the programmer with a great deal of control over the implementation of abstract data types. In this paper the abstraction techniques are extended from simple data representation and...
详细信息
The Alphard 'form' provides the programmer with a great deal of control over the implementation of abstract data types. In this paper the abstraction techniques are extended from simple data representation and function definition to the iteration statement, the most important point of Interaction between data and the control structure of the language Itself. A means of specializing Alphard's loops to operate on abstract entities without explicit dependence on the representation of those entities is introduced. Specification and verification techniques that allow the properties of the generators for such iterations to be expressed in the form of proof rules are developed. Results are obtained that for common special cases of these loops are essentially identical to the corresponding constructs in other languages. A means of showing that a generator will terminate is also provided. [ABSTRACT FROM AUTHOR]
A programming methodology for distributed computer complexes is considered. A two-stage programming scheme is suggested where the stage of applied programming is separated from the stage of organizing the joint execut...
详细信息
A programming methodology for distributed computer complexes is considered. A two-stage programming scheme is suggested where the stage of applied programming is separated from the stage of organizing the joint execution of applied programs. Formal models of languages for organizing computations on distributed computers are analysed. Models of languages for organizing the joint operation of applied programs and the distributed operating system programs are considered separately. Results obtained in implementation of these language models are given.
Reports the specification and verification experience in producing a secure operating system. Construction of Data Secure Unix; Application of program verification method on security enforcement demonstration; Verific...
详细信息
Reports the specification and verification experience in producing a secure operating system. Construction of Data Secure Unix; Application of program verification method on security enforcement demonstration; Verification on the performance of large scale, production level system.
This book describes---in depth---the most important principles of Agile development: delivering value to the customer, focusing on individual developers and their skills, collaboration, an emphasis on producing workin...
详细信息
ISBN:
(纸本)0201760436;9780201760439
This book describes---in depth---the most important principles of Agile development: delivering value to the customer, focusing on individual developers and their skills, collaboration, an emphasis on producing working software, the critical contribution of technical excellence, and a willingness to change course when demands shift. All major Agile methods are presented: * Scrum, * Dynamic Systems Development Method, *CrystalMethods , * Feature-Driven Development, * Lean Development, * Extreme programming, and* Adaptive Software Development. Throughout the book, case stories are used to illustrate how Agile practices empower success around the world in today's chaotic software development industry. Agile Software Development Ecosystems also examines how to determine your organization's Agile readiness, how to design a custom Agile methodology, and how to transform your company into a truly Agile organization.
My new boss wasn’t being a jerk, but it seemed like it at the time. We were writing new software for use in the company’s high-volume call centers. Instead of the 12 months I told him we’d probably need, he had agr...
详细信息
ISBN:
(纸本)9780735619937
My new boss wasn’t being a jerk, but it seemed like it at the time. We were writing new software for use in the company’s high-volume call centers. Instead of the 12 months I told him we’d probably need, he had agreed to give me 4 months. We wouldn’t necessarily start using the new software in 4 months, but from that point on, all my boss could give me was 30 days’ notice of a go-live date. After the first 4 months, I would have to keep the software within 30 days of releasable. My boss understood that not all functionality would be there after 4 months. He just wanted as much as he could get, as fast as he could get it. I needed to find a process that would let us do this. I scoured everything I could find on software development processes, which led me to Scrum and to Ken Schwaber’s early writings on *** the years since my first Scrum project, I have used Scrum on commercial products, software for internal use, consulting projects, projects with ISO 9001 requirements, and others. Each of these projects was unique, but what they had in common was urgency and criticality. Scrum excels on urgent projects that are critical to an organization. Scrum excels when requirements are unknown, unknowable, or changing. Scrum excels by helping teams *** this book, Ken Schwaber correctly points out that Scrum is hard. It’s not hard because of the things you do; it’s hard because of the things you don’t do. If you’re a project manager, you might find some of your conventional tools missing. There are no Gantt charts in Scrum, there’s no time reporting, and you don’t assign tasks to programmers. Instead you’ll learn the few simple rules of Scrum and how to use its frequent inspect-and-adapt cycles to create more valuable software *** was there at the beginning of Scrum. Ken, along with Jeff Sutherland, was the original creator of Scrum and has always been its most vocal proponent. In this book, we get to read about many of the Scrum projects Ken has participated in.
A proof is given of the correctness of the algorithm 'Find.' First, an informal description is given of the purpose of the program and the method used. A systematic technique is described for constucting the p...
详细信息
A proof is given of the correctness of the algorithm 'Find.' First, an informal description is given of the purpose of the program and the method used. A systematic technique is described for constucting the program proof during the process of coding it, in such a way as to prevent the intrusion of logical errors. The proof of termination is treated as a separate exercise. Finally, some conclusions relating to general programming methodology are drawn. [ABSTRACT FROM AUTHOR]
This paper discusses some high-level language programming constructs that can be used to manipulate the relations of a relational database system efficiently. Three different constructs are described: (1) tuple identi...
详细信息
This paper discusses some high-level language programming constructs that can be used to manipulate the relations of a relational database system efficiently. Three different constructs are described: (1) tuple identifiers that directly reference tuples of a relation; (2) cursors that may iterate over the tuples of a relation; and (3) markings, a form of temporary relation consisting of a set of tuple identifiers. In each case, attention is given to syntactic, semantic, and implementation *** use of these features is first presented within the context of the programming language PLAIN, and it is then shown how these features could be used more generally to provide database manipulation capabilities in a high-level programming language. Consideration is also given to issues of programming methodology, with an important goal being the achievement of a balance between the enforcement of good programming practices and the ability to write efficient programs.
Test-Driven Development: A Practical Guide presents TDD from the perspective of the working programmer: real projects, real challenges, real solutions, ...real code. Dave Astels explains TDD through a start-to-finish ...
详细信息
ISBN:
(纸本)0131016490
Test-Driven Development: A Practical Guide presents TDD from the perspective of the working programmer: real projects, real challenges, real solutions, ...real code. Dave Astels explains TDD through a start-to-finish project written in Java and using JUnit. He introduces powerful TDD tools and techniques; shows how to utilize refactoring, mock objects, and "programming by intention"; even introduces TDD frameworks for C++, C#/.NET, Python, VB6, Ruby, and Smalltalk. Invaluable for anyone who wants to write better code... and have more fun doing it!
From a leader in the agile process movement, learn best practices for moving agile development with Scrum from the skunk works (small team) to the shop floor (the enterprise). Managers get case studies and practical g...
详细信息
ISBN:
(纸本)0735623376
From a leader in the agile process movement, learn best practices for moving agile development with Scrum from the skunk works (small team) to the shop floor (the enterprise). Managers get case studies and practical guidance for managing the change processes for applying Scrum in the enterprise.
Configuration management (CM) is frequently misunderstood. This discipline is growing in popularity because it allows project participants to better identify potential problems, manage change, and efficiently track th...
详细信息
ISBN:
(纸本)9780321117663
Configuration management (CM) is frequently misunderstood. This discipline is growing in popularity because it allows project participants to better identify potential problems, manage change, and efficiently track the progress of a software project. CM is not easy, but at the same time, it need not be difficult. This book gives the reader a practical understanding of the complexity and comprehensiveness of the discipline. Many current CM practitioners rely too heavily on commercial CM tools, and fail to understand the concept as a whole. With the deeper knowledge of CM principles taught in this book, readers will be better able to manage and deliver their next project. The book is included in the Agile Software Development Series because there is growing recognition that an effective configuration management strategy is the cornerstone of a truly agile project.
暂无评论