Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Barnes, J.: High Integrity Software: The Spark Approach to Safety and Security. Addison-Wesley, Reading (2003)
2. Lecture Notes in Computer Science;M. Barnett,2005
3. Bartetzko, D., Fischer, C., Moller, M., Wehrheim, H.: Jass—Java with Assertions. Electronic Notes in Theoretical Computer Science 55(2), 103–117 (2001)
4. Burdy, L., Cheon, Y., Cok, D.R., Ernst, M.D., Kiniry, J.R., Leavens, G.T., Leino, K.R.M., Poll, E.: An Overview of JML Tools and Applications. International Journal on Software Tools for Technology Transfer (STTT) 7(3), 212–232 (2005)
5. Lecture Notes in Computer Science;L. Burdy,2003
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Python-by-contract dataset;Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2022-11-07
2. Contracts in Practice;Lecture Notes in Computer Science;2014
3. Inferring better contracts;Proceedings of the 33rd International Conference on Software Engineering;2011-05-21
4. On the number and nature of faults found by random testing;Software Testing, Verification and Reliability;2011-02-21
5. Usable Verification of Object-Oriented Programs by Combining Static and Dynamic Techniques;Software Engineering and Formal Methods;2011