• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 37,934
Next 10 →

Table 2. Weakening the postcondition

in An Automated Approach for Supporting Software Reuse via Reverse Engineering
by Gerald C. Gannod, Yonghao Chen, Betty H.C. Cheng 1998
"... In PAGE 4: ... As such, I I0, since ((I0 pre $ Ipre) ^ (Ipost ! I0 post)) ) ((I0 pre ! Ipre) ^ (Ipost ! I0 post)): (1) Expression (1) provides a basis for deriving abstractions from a specification by weakening a postcondition Ipost to produce a postcondition I0 post. Several options are avail- able for weakening the postcondition including those listed in Table2 , which includes delete a conjunct, add a disjunct,... ..."
Cited by 5

Table 2: Weakening the postcondition

in An Automated Approach for Supporting Software Reuse via Reverse Engineering
by Gerald C. Gannod, Yonghao Chen, Betty H. C. Cheng
"... In PAGE 8: ... As such, I I0, since ((I0 pre $ Ipre) ^ (Ipost ! I0 post)) ) ((I0 pre ! Ipre) ^ (Ipost ! I0 post)): (1) Expression (1) provides a basis for deriving abstractions from a specification by weakening a postcondition Ipost to produce a postcondition I0 post. Several options are available for weakening the postcondition including those listed in Table2 , which includes delete a conjunct, add a disjunct, ^ to _ transformation, and ^ to ! transformation.... ..."

Table 2: Weakening the postcondition

in An Automated Approach for Supporting Software Reuse via Reverse Engineering
by Gerald Gannod, Yonghao Chen, Betty H. C. Cheng 1998
"... In PAGE 5: ... As such, I I0, since ((I0 pre $ Ipre) ^ (Ipost ! I0 post)) ) ((I0 pre ! Ipre) ^ (Ipost ! I0 post)): (1) Expression (1) provides a basis for deriving abstractions from a specification by weakening a postcondition Ipost to produce a postcondition I0 post. Several options are avail- able for weakening the postcondition including those listed in Table2 , which includes delete a conjunct, add a dis- junct, ^ to _ transformation, and ^ to ! transformation.... ..."
Cited by 5

Table 2: The weaken operation

in Verifying Operating System Security
by J. S. Shapiro, S. Weber 1997
"... In PAGE 4: ... Weak capabilities enforce transitively read-only access. If an invocation on a capability, such as the \fetch quot; operation on a node capability, would return some other capability, and the invoked capability is weak, then returned capabilities are weakened according to the rules in Table2 before being returned. The e ect of the weak attribute is to provide transitive read-only authority, which simpli es... ..."
Cited by 11

Table 2: The weaken operation

in Verifying operating system security
by J. S. Shapiro, S. Weber 1997
"... In PAGE 4: ... Weak capabilities enforce transitively read-only access. If an invocation on a capability, such as the fetch operation on a node capability, would return some other capability, and the invoked capability is weak, then returned capabilities are weakened according to the rules in Table2 before being returned. The effect of the weak attribute is to provide transitive read-only authority, which simplifies the construction of confined subsystems.... ..."
Cited by 11

Table 2. Weakening the postcondition

in A Formal Approach for Reverse Engineering: A Case Study
by Gerald Gannod, Betty Cheng
"... In PAGE 3: ...B4B4C1BC D4D6CT B0 C1D4D6CTB5 CM B4C1D4D3D7D8 AX C1BC D4D3D7D8B5B5 B5 B4B4C1BC D4D6CT AX C1D4D6CTB5 CM B4C1D4D3D7D8 AX C1BC D4D3D7D8B5B5BM (1) Expression (1) provides a basis for deriving abstractions from a specification by weakening a postcondition C1D4D3D7D8 to produce a postcondition C1BC D4D3D7D8. Several options are avail- able for weakening the postcondition including those listed in Table2 , which includes delete a conjunct, add a disjunct, transform CM to CN, and transform CM to AX. In our previous in- vestigations, we described several strategies for weakening postconditions based on module and specification charac-... ..."

Table 2: The weaken operation

in EROS: A Capability System
by J. S. Shapiro, J.M. Smith, D.J. Farber 1999
Cited by 25

Table 2: The weaken operation

in EROS: A Capability System
by J. S. Shapiro, J. M. Smith, D. J. Farber 1999
Cited by 25

Table 2: The weaken operation

in EROS: A Capability System
by J. S. Shapiro, J. M. Smith, D. J. Farber 1999
Cited by 25

Table 4. Deciding weakening problems

in On Generalizations of Semi-Terms of Particularly Simple Form ⋆
by Matthias Baaz, Georg Moser
"... In PAGE 9: ... Table4 presents a non-deterministic algorithm which decides whether a con- junction of semi-term weakening problem has a solution. A solution is minimal if for any other solution of x = t, size(t ) size(t ).... ..."
Next 10 →
Results 1 - 10 of 37,934
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University