منابع مشابه
Software Aging Invited Plenary Talk
Programs, like people, get old. We can’t prevent aging, but we can understand its causes, take steps to limits its effects, temporarily reverse some of the damage it has caused, and prepare for the day when the software is no longer viable. A sign that the SofnYare Engineering profession has matured will be that we lose our preoccupation with the first release and focus on the long term health ...
متن کاملLightning Talk: Bringing Techniques from Software Engineering into Scientific Software
Research software, for example the large body of simulation frameworks and libraries in Computational Science & Engineering (CSE), is often designed, developed, and then supported by students and postdoctoral researchers trained in scientific domains and not in the discipline of software engineering. While there are a number of initiatives to improve the training and support recognition of thes...
متن کاملSoftware Languages: The Linguistic Continuum (Invited talk)
While computers are linguistic machines moving symbols around, Informatics is BY and FOR people. I claim here that the gap between Computer Languages and Human Languages is, as a matter of fact, filled by a wide spectrum of Software Languages. My point is that the notion of Software Language goes far beyond Programming Languages; just like Informatics is indeed much more than Computer Science. ...
متن کاملLightning Talk: Supporting Software Sustainability with Lightweight Specifications
Lightweight specifications support software maintainability by providing a way to verify that any changes to a code base preserve certain program properties. We give two examples of lightweight specifications for numerical code: units-of-measure types which specify the physical units of numerical quantities in a program; and stencil specifications which describe the pattern of data access used ...
متن کاملSoftware Security: A Formal Perspective - (Notes for a Talk)
Weaknesses in software security have been numerous, sometimes startling, and often serious. Many of them stem from apparently small low-level errors (e.g., buffer overflows). Ideally, those errors should be avoided by design, or at least fixed after the fact. In practice, on the other hand, we may have to tolerate some vulnerabilities, with appropriate models, architectures, and tools. This sho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1970
ISSN: 0028-0836,1476-4687
DOI: 10.1038/227207b0