Applications of Ada reusable components based on set and sequence

被引:0
|
作者
Li, Yunqing
Yang, Qinghong
Xue, Jinyun
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:23 / 25
相关论文
共 50 条
  • [2] REUSABLE INPUT OUTPUT PACKAGES FOR ADA AVIONIC APPLICATIONS
    ROSSKOPF, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 499 : 338 - 360
  • [3] CONSTRUCTING APPLICATIONS FROM REUSABLE COMPONENTS
    STARINGER, W
    IEEE SOFTWARE, 1994, 11 (05) : 61 - 68
  • [4] Identifying reusable components in Web applications
    Di Lucca, GA
    Fasolino, AR
    Tramontana, P
    De Carlini, U
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2004, : 526 - 531
  • [5] Reusable aspect components for Web applications
    Hokamura, Keiji
    Ubayashi, Naoyasu
    Nakajima, Shin
    Iwai, Akihito
    TENCON 2010: 2010 IEEE REGION 10 CONFERENCE, 2010, : 1059 - 1064
  • [6] Encapsulating windows-based software applications into reusable components with design patterns
    Hong, Zeng-Wei
    Lin, Jim-Min
    Jiau, Hewijin C.
    Fang, Guo-Ming
    Chiou, Che Wun
    INFORMATION AND SOFTWARE TECHNOLOGY, 2006, 48 (07) : 619 - 629
  • [7] DESIGN OF ADA SYSTEMS YIELDING REUSABLE COMPONENTS - AN APPROACH USING STRUCTURED ALGEBRAIC SPECIFICATION
    LITVINTCHOUK, SD
    MATSUMOTO, AS
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1984, 10 (05) : 544 - 551
  • [8] GRAPHICAL DESIGN OF DISTRIBUTED APPLICATIONS THROUGH REUSABLE COMPONENTS
    BARTOLI, A
    CORSINI, P
    DINI, G
    PRETE, CA
    IEEE PARALLEL & DISTRIBUTED TECHNOLOGY, 1995, 3 (01): : 37 - 50
  • [9] Toward developing reusable software components for robotic applications
    Nesnas, IAD
    Volpe, R
    Estlin, T
    Das, H
    Petras, R
    Mutz, D
    IROS 2001: PROCEEDINGS OF THE 2001 IEEE/RJS INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS, VOLS 1-4: EXPANDING THE SOCIETAL ROLE OF ROBOTICS IN THE NEXT MILLENNIUM, 2001, : 2375 - 2383
  • [10] Reusable components for developing security-aware applications
    Probst, S
    Essmayr, W
    Weippl, E
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 239 - 248