Listing 1 - 10 of 10 |
Sort by
|
Choose an application
681.3*D1 --- 681.3*D2 --- Programming techniques--See also {681.3*E} --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Conferences - Meetings --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- 681.3*D1 Programming techniques--See also {681.3*E}
Choose an application
Computer software --- eXtreme programming --- Development --- 681.3*D2 --- XP (Computer science) --- Computer programming --- Development of computer software --- Software development --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Computer software - Development
Choose an application
Programming --- software engineering --- Software engineering --- 681.3*D2 --- 681.3* / / / / / / / / / / / / / / / / / / / / / / / / / / / / --- Computer software engineering --- Engineering --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Computer science
Choose an application
Designing application and middleware software to run in concurrent and networked environments is a significant challenge to software developers. The patterns catalogued in this second volume of Pattern-Oriented Software Architecture (POSA) form the basis of a pattern language that addresses issues associated with concurrency and networking. The book presents 17 interrelated patterns ranging from idioms through architectural designs. They cover core elements of building concurrent and network systems: service access and configuration, event handling, synchronization, and concurrency. All patterns present extensive examples and known uses in multiple programming languages, including C++, C, and Java. The book can be used to tackle specific software development problems or read from cover to cover to provide a fundamental understanding of the best practices for constructing concurrent and networked applications and middleware.
Computer software --- -681.3 --- 681.3*D2 --- 681.3*D210 --- 681.3*D210 Design: methodologies representation (Software engineering) --- Design: methodologies representation (Software engineering) --- 681.3*D2 Software engineering: protection mechanisms standards--See also {681.3*K63} {681.3*K51} --- Software engineering: protection mechanisms standards--See also {681.3*K63} {681.3*K51} --- Software, Computer --- Computer systems --- Development --- Computerwetenschap --- patterns --- 681.3*D210 Design: methodologies; representation (Software engineering) --- Design: methodologies; representation (Software engineering) --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Software architecture --- Software patterns --- netwerken --- software --- 681.3 --- Patterns, Software --- Architecture, Software --- Computer software architecture --- Architecture --- Design --- Computer science --- Programming --- 681.3* / / / / / / / / / / / / / / / / / / / / / / / / / / / / --- Software architecture. --- Software patterns. --- Computer software - Development
Choose an application
"The toughest challenge in building a software system that meets the needs of your audience lies in clearly understanding the problems that the system must solve. Advanced Use Case Modeling presents a framework for discovering, identifying, and modeling the problem that the software system will ultimately solve." "Software developers often employ use cases to specify what should be performed by the system they're constructing. Although use case-driven analysis, design, and testing of software systems has become increasingly popular, little has been written on the role of use cases in the complete software cycle. This book fills that need by describing how to create use case models for complex software development projects, using practical examples to explain conceptual information." "The authors extend the work of software visionary Ivar Jacobson, using the Unified Modeling Language (UML) as the notation to describe the book's models. Aimed primarily at software professionals, Advanced Use Case Modeling also includes information that relates use case technique to business processes." "This book presents a process for creating and maintaining use case models in a framework that can be fully customized for your organization. The authors, pioneers in the application of use cases in software development, bring their extensive experience to cover topics such as: a process model for applying a use case model; how to keep your use case modeling effort on track; tips and pitfalls in use case modeling; how to organize your use case model for large-system development; similarities between Advanced Use Case Modeling and the Rational Unified Process framework; effect of use cases on user interface design; and guidelines for quality use case modeling."--Jacket
Programming --- software engineering --- UML (unified modeling language) --- Computer. Automation --- Computer architecture. Operating systems --- Computer software --- Use cases (Systems engineering) --- Development. --- Use cases (Systems engineering). --- 681.3*D2 --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Systems engineering --- Development of computer software --- Software development --- Development
Choose an application
Huldeboeken --- Logiciels --- Mélanges --- Software --- Verhelst, Maurice --- Academic collection --- 681.3*D2 --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Festschrift - Libri Amicorum --- Internet programming. --- Object-oriented methods (Computer science) --- Software engineering. --- Object-oriented methods (Computer science). --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Internet programming --- Software engineering --- Computer software engineering --- Engineering --- Computer programming
Choose an application
Industrial and intellectual property --- Information user --- Electronic information resources --- Data protection --- Copyright --- Intellectual property --- Sources d'information électroniques --- Protection de l'information (Informatique) --- Droit d'auteur --- Propriété intellectuelle --- Law and legislation --- Droit --- Electronic information resources. --- Law and legislation. --- 002:62 --- 34:681.3 --- Copyright and electronic data processing --- -Data protection --- -Databases --- -Intellectual property --- -681.3*K51 --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Intangible property --- Data banks --- Data bases --- Databanks --- Database systems --- Computer files --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Electronic data processing and copyright --- Copyright infringement --- Fair use (Copyright) --- Informatietechnologie --- Informaticarecht --- -Law and legislation --- -Software protection: copyrights; patents; proprietary rights; trade secrets (Legal aspects of computing) --- 681.3*K51 Software protection: copyrights; patents; proprietary rights; trade secrets (Legal aspects of computing) --- Software protection: copyrights; patents; proprietary rights; trade secrets (Legal aspects of computing) --- 34:681.3 Informaticarecht --- 002:62 Informatietechnologie --- Intellectual property. --- Sources d'information électroniques --- Propriété intellectuelle --- Copyright - Electronic information resources. --- Data protection - Law and legislation. --- -Copyright --- -Information user
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 4th International Andrei Ershov Memorial Conference, PSI 2001, held in Akademgorodok, Novosibirsk, Russia, in July 2001. The 50 revised papers presented together with 2 invited memorial papers devoted to the work of Andrei Ershov were carefully selected during 2 rounds of reviewing and improvement. The book offers topical sections on computing and algorithms, logical methods, verification, program transformation and synthesis, semantics and types, processes and concurrency, UML specification, Petri nets, testing, software construction, data and knowledge bases, logic programming, constraint programming, program analysis, and language implementation.
Computer science --- Computer programming --- Systems engineering --- Computer Science --- Engineering & Applied Sciences --- 681.3*D1 --- 681.3*D2 --- 681.3*D3 --- 681.3*F1 --- 681.3*F3 --- Programming techniques--See also {681.3*E} --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Programming languages --- Computation by abstract devices --- Logics and meanings of programs (Theory of computation) --- Congresses --- 681.3*F3 Logics and meanings of programs (Theory of computation) --- 681.3*F1 Computation by abstract devices --- 681.3*D3 Programming languages --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- 681.3*D1 Programming techniques--See also {681.3*E} --- Computer science. --- Architecture, Computer. --- Computer programming. --- Software engineering. --- Programming languages (Electronic computers). --- Computers. --- Computer logic. --- Computer Science. --- Computer System Implementation. --- Programming Languages, Compilers, Interpreters. --- Logics and Meanings of Programs. --- Programming Techniques. --- Software Engineering. --- Computation by Abstract Devices. --- Computer science logic --- Logic, Symbolic and mathematical --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computer software engineering --- Engineering --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Architecture, Computer --- Informatics --- Science --- Programming --- Computer network architectures. --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Switching theory --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer science - Congresses --- Computer programming - Congresses --- Systems engineering - Congresses
Choose an application
The Sixth International Conference on Reliable Software Technologies, Ada- Europe 2001, took place in Leuven, Belgium, May 14-18, 2001. It was sponsored by Ada-Europe, the European federation of national Ada societies, in cooperation with ACM SIGAda, and it was organized by members of the K.U. Leuven and Ada- Belgium. This was the 21st consecutive year of Ada-Europe conferences and the sixth year of the conference focusing on the area of reliable software technologies. The use of software components in embedded systems is almost ubiquitous: planes fly by wire, train signalling systems are now computer based, mobile phones are digital devices, and biological, chemical, and manufacturing plants are controlled by software, to name only a few examples. Also other, non-embedded, mission-critical systems depend more and more upon software. For these products and processes, reliability is a key success factor, and often a safety-critical hard requirement. It is well known and has often been experienced that quality cannot be added to software as a mere afterthought. This also holds for reliability. Moreover, the reliability of a system is not due to and cannot be built upon a single technology. A wide range of approaches is needed, the most difficult issue being their purposeful integration. Goals of reliability must be precisely defined and included in the requirements, the development process must be controlled to achieve these goals, and sound development methods must be used to fulfill these non-functional requirements.
681.3*D14 --- 681.3*D15 --- Ada (Computer program language) --- 681.3*D12 --- 681.3*D13 --- 681.3*D2 --- Programming languages (Electronic computers) --- Sequential programming --- Software: object-oriented programming --- Automatic programming--See also {681.3*I22} --- Concurrent programming --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Computer Science --- Engineering & Applied Sciences --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- 681.3*D13 Concurrent programming --- 681.3*D12 Automatic programming--See also {681.3*I22} --- 681.3*D15 Software: object-oriented programming --- 681.3*D14 Sequential programming --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Software engineering. --- Computer programming. --- Programming languages (Electronic computers). --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Programming Languages, Compilers, Interpreters. --- Software Engineering. --- Programming Techniques. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Programming --- Distributed processing --- Ada (Computer program language) - Congresses
Choose an application
Programming --- Computer systems --- Computer software --- Systèmes informatiques --- Logiciels --- Verification --- Vérification --- 681.3*D24 --- 681.3*D2 --- 681.3*D45 --- 681.3*F32 --- 681.3*F31 --- 681.3*F41 --- 681.3*G4 --- 681.3*I22 --- Software verification --- Verification of software --- Verification of computer systems --- Program verification: assertion checkers; correctness proofs; reliability; validation (Software engineering)--See also {681.3*F31} --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Reliability: backup procedures; checkpoint/restart; fault-tolerance; verification (Operating systems) --- Semantics of programming languages: algebraic approaches to semantics; denotational semantics; operational semantics (Logics and meanings of programs)--See also {681.3*D31} --- Specifying anf verifying and reasoning about programs: assertions; invariants; mechanical verification; pre- and post-conditions (Logics and meanings of programs)--See also {681.3*D21}; {681.3*D24}; {681.3*D31}; {681.3*E1} --- Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- Mathematical software: algorithm analysis; certification and testing; efficiency; portability; reliability and robustness; verification --- Automatic programming: automatic analysis of algorithms; program modification; program synthesis; program transformation; program verification (Artificialintelligence)--See also {681.3*D12}; {681.3*F31} --- Verification. --- 681.3*I22 Automatic programming: automatic analysis of algorithms; program modification; program synthesis; program transformation; program verification (Artificialintelligence)--See also {681.3*D12}; {681.3*F31} --- 681.3*G4 Mathematical software: algorithm analysis; certification and testing; efficiency; portability; reliability and robustness; verification --- 681.3*F41 Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- 681.3*F31 Specifying anf verifying and reasoning about programs: assertions; invariants; mechanical verification; pre- and post-conditions (Logics and meanings of programs)--See also {681.3*D21}; {681.3*D24}; {681.3*D31}; {681.3*E1} --- 681.3*F32 Semantics of programming languages: algebraic approaches to semantics; denotational semantics; operational semantics (Logics and meanings of programs)--See also {681.3*D31} --- 681.3*D45 Reliability: backup procedures; checkpoint/restart; fault-tolerance; verification (Operating systems) --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- 681.3*D24 Program verification: assertion checkers; correctness proofs; reliability; validation (Software engineering)--See also {681.3*F31} --- Systèmes informatiques --- Vérification
Listing 1 - 10 of 10 |
Sort by
|