نتایج جستجو برای: gui computer code
تعداد نتایج: 717562 فیلتر نتایج به سال:
The Vienna Development Method is supported by several tools. These tools allow generating Java code from a VDM++ specification but do not generate a graphical user interface (GUI). This paper describes a generic approach and tool to automatically generate a GUI in Java from a VDM++ specification. The generated GUI calls methods of the VDM++ specification, which allows testing the specification ...
G raphical user interfaces have become a nearly ubiquitous means of interacting with software systems. The GUI responds to user events, such as mouse movements or menu selections , providing a front end to the underlying application code. The GUI interacts with the underlying code through messages or method calls. GUIs make software easy to use, and developers are dedicating a larger portion of...
Computer Operations Performance System (COPS) is a simulation tool for network modeling. COPS consists of five interactive components: the command interpreter, the graphical user interface, the library, the simulation engine, and the output analysis. The organization of COPS is illustrated in Figure 1. The user constructs models by using the graphical user interface (GUI). The command interpret...
" On my honor as a student, I have neither given nor received aid on this assignment " 1 Executive Summary With the advent of window based operating system interfaces, Graphical User Interfaces (GUIs) have emerged as the de facto means by which users employ computer programs. Nonetheless, GUIs represent only a single interface – that between the user and other software. In the field of Computer...
The inception of a mobile app often takes form of a mock-up of the Graphical User Interface (GUI), represented as a static image delineating the proper layout and style of GUI widgets that satisfy requirements. Following this initial mock-up, the design artifacts are then handed off to developers whose goal is to accurately implement these GUIs and the desired functionality in code. Given the s...
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic bugs in GUI design/implementation. Visual spoofing attacks that exploit these flaws can lure even security-conscious users to perform unintended actions...
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
With the widespread deployment of broadband connections worldwide, software development and maintenance are increasingly being done by multiple engineers, often working around-theclock to maximize code churn rates. To ensure rapid quality assurance of such software, techniques such as “nightly/daily building and smoke testing” have become widespread since they often reveal bugs early in the sof...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید