Integrating Components, Contracts, and Reasoning in CS Curricula with RESOLVE: Experiences at Multiple Institutions
Heym, Wayne, Sivilotti, Paolo A. G., Bucci, Paolo, Sitaraman, Murali, Plis, Kevin, Hollingsworth, Joseph E., Krone, Joan, Sridhar, Nigamanth
Published in 2017 IEEE 30th Conference on Software Engineering Education and Training (CSEE&T) (01.11.2017)
Published in 2017 IEEE 30th Conference on Software Engineering Education and Training (CSEE&T) (01.11.2017)
Get full text
Conference Proceeding
Building a push-button RESOLVE verifier: Progress and challenges
Sitaraman, Murali, Adcock, Bruce, Avigad, Jeremy, Bronish, Derek, Bucci, Paolo, Frazier, David, Friedman, Harvey M., Harton, Heather, Heym, Wayne, Kirschenbaum, Jason, Krone, Joan, Smith, Hampton, Weide, Bruce W.
Published in Formal aspects of computing (01.09.2011)
Published in Formal aspects of computing (01.09.2011)
Get full text
Journal Article
Conference Proceeding
Reverse engineering of legacy code exposed
Weide, Bruce W., Heym, Wayne D., Hollingsworth, Joseph E.
Published in 1995 17th International Conference on Software Engineering (23.04.1995)
Published in 1995 17th International Conference on Software Engineering (23.04.1995)
Get full text
Conference Proceeding
Incremental Benchmarks for Software Verification Tools and Techniques
Weide, Bruce W., Sitaraman, Murali, Harton, Heather K., Adcock, Bruce, Bucci, Paolo, Bronish, Derek, Heym, Wayne D., Kirschenbaum, Jason, Frazier, David
Published in Verified Software: Theories, Tools, Experiments
Published in Verified Software: Theories, Tools, Experiments
Get full text
Book Chapter
A Language for Building Verified Software Components
Kulczycki, Gregory, Sitaraman, Murali, Krone, Joan, Hollingsworth, Joseph E., Ogden, William F., Weide, Bruce W., Bucci, Paolo, Cook, Charles T., Drachova-Strang, Svetlana V., Durkee, Blair, Harton, Heather, Heym, Wayne, Hoffman, Dustin, Smith, Hampton, Sun, Yu-Shan, Tagore, Aditi, Yasmin, Nighat, Zaccai, Diego
Published in Safe and Secure Software Reuse
Published in Safe and Secure Software Reuse
Get full text
Book Chapter