6
6.0
audio
eye 6
favorite 0
comment 0
Topics: Radio Program, Walking, Physical exercise, National security, Chemical elements, Psychology,...
Topics: Radio Program, Business terms, Computer errors, American rock music groups, Lotteries, Computing...
This report is composed of studies that have been conducted to develop the NLS system as an on-line programming environment and to provide an on-line JOVIAL interactive debugger with the capabilities to debug JOVIAL language programs. The final report contains several design additions to the NLS system to create an on-line programming environment. A JOVIAL User's Guide prepared in Addendum Technical Report I provides and extensive set of commands for using the JDAD Debugger. Addendum Techincal...
Topics: DTIC Archive, Parsley,Bruce L, SRI INTERNATIONAL MENLO PARK CA, *DEBUGGING(COMPUTERS), COMPUTER...
The concept of utilizing a computer as an aid for test program design and validation is not new to automatic testing technology. During the 1960's a number of attempts were made to develop simulators to simplify the test program debugging and validation effort. Most, if not all, such efforts proved to be less than effective. The complexity of the units to be tested generally made modeling prohibitively expensive. Attempts at modeling circuit designs to generate test programs with computers were...
Topics: DTIC Archive, Liguori, Fred, NAVAL AIR ENGINEERING CENTER LAKEHURST NJ, *COMPUTER AIDED DESIGN,...
The purpose of this report is to compile in one document the variety of user considerations relating to software design of computer-based information systems. Approximately 500 such considerations that currently exist in a variety of thirteen source documents are included. For organizational purposes, the compilation was divided into seven major parts including data organization, dialogue modes, user input devices, command language and command processing, feedback and error management, security...
Topics: DTIC Archive, Williges, Beverly H., VIRGINIA POLYTECHNIC INST AND STATE UNIV BLACKSBURG COMPUTER...
93
93
Nov 3, 2004
11/04
by
http://www.stintercorp.com/netSX2/pingSX2.php
software
eye 93
favorite 0
comment 0
Ping local and remote addresses or Web sites from your computer to test the connection speeds of various locations.
Topics: PingSX2, Internet, Network protocols, Finger and ping, Ping, Pinging, Connection Speed, Resolving...
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
Einstieg in das Betriebssystem für die 68000-Familie Wer mit dem Betriebssystem CP/M-68K arbeitet, der sollte zu diesem Handbuch greifen. Bereits die ersten Schritte werden ihm dann leicht gemacht. Die wichtigsten Informationen über das System sind hier in deutscher Sprache zusammengetragen und aufbereitet: Die Kommandos und deren Handhabung. Der Aufbau des Betriebssystems aus BIOS, BDOS und CCP. Der Editor, der Assembler und der Debugger. Weiterhin werden die Funktionen der...
Topics: CP/M-68K, Motorola 68000, operating system, programming, C compiler, assembler, BIOS, editing,...
403
403
Nov 13, 2012
11/12
by
Warren Myers
texts
eye 403
favorite 0
comment 0
Topics: debugging, computer-science, programming, troubleshooting, computer science
Topics: DTIC Archive, ARMY ENGINEER WATERWAYS EXPERIMENT STATION VICKSBURG MS, *INTERACTIVE GRAPHICS,...
The goal of this research has been to develop a formal and executable algebraic specification language which can be used to specify a variety of application programs, such as database systems, compilers and interpreters for programming languages, and business systems. An advantage of formality in this context is that each specification has a unique unambiguous meaning, so that it is actually meaningful to ask whether or not a given program in fact satisfies a given specification. An advantage...
Topics: DTIC Archive, Goguen,Joseph A, SRI INTERNATIONAL MENLO PARK CA COMPUTER SCIENCE LAB, *METHODOLOGY,...
The Ada Integrated Environment (AIE) consists of a set of software tools intended to support design, development and maintenance of embedded computer software. A significant portion of an AIE includes software systems and tools residing and executing on a host computer (or set of computers). This set is known as an Ada Programming Support Environment (APSE). This system specification describes the basic design for a minimal APSE, called a MAPSE. The MAPSE is the foundation upon which an APSE is...
Topics: DTIC Archive, INTERMETRICS INC CAMBRIDGE MA, *COMPUTER PROGRAMMING, *HIGH LEVEL LANGUAGES, DATA...
In order to build a computer-based programming tutor for novice programmers, it was necessary to first classify the bugs found in their programs on the basis of type and frequency. However, the enterprise of classification turns out to be a complicated process. While one may want to be able to simply use features in the program itself as the basis for the classification, it turns out that such a scheme will result in classifications that seem to miss the mark, i.e., the classifications will not...
Topics: DTIC Archive, Johnson,W Lewis, YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE,...
The debugging cycle is the most common methodology for finding and correcting errors in sequential programs. Cyclic debugging is effective because sequential programs are usually deterministic. Debugging parallel programs is considerably more difficult because successive executions of the same program often do not produce the same results. In this paper we present a general solution for reproducing the execution behavior of parallel programs, termed Instant Replay. During program execution we...
Topics: DTIC Archive, LeBlanc,Thomas J, ROCHESTER UNIV NY DEPT OF COMPUTER SCIENCE, *DEBUGGING(COMPUTERS),...
The space shuttle is controlled largely by five on-board computer systems. Bugs in these systems' software can cause mission failure, loss of vehicle, even loss of life. Because each shuttle flight is unique, each requires changes to thousands of lines of computer code. Since fiscal year 1981, the National Aeronautics and Space Administration (NASA) has spent more than $324 million developing, testing, and implementing shuttle software to support commercial projects, scientific research, and...
Topics: DTIC Archive, Beers, Ronald W, GENERAL ACCOUNTING OFFICE WASHINGTON DC INFORMATION MANAGEMENT AND...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
Software developers often complain that researchers in the field of software engineering propose new ideas without testing these ideas in practical applications. The Architecture Research Facility (ARF) was developed utilizing several software engineering techniques in order to discover their usefulness in actual software system developments. Such techniques as the complete design and documentation of the individual components and interfaces prior to coding; design reviews; code specification...
Topics: DTIC Archive, Elovitz,Honey S, NAVAL RESEARCH LAB WASHINGTON DC, *COMPUTER PROGRAM DOCUMENTATION,...
We describe a program for verifying that a set of rules in an expert system comprehensively spans the knowledge of a specialized domain. The program has been devised and tested within the context of the ONCOCIN System, a rule-based consultant for clinical oncology. The stylized format of ONCOCIN's rules has allowed the automatic detection of a number of common errors as the knowledge base has been developed. This capability suggests a general mechanism for correcting many problems with...
Topics: DTIC Archive, Suwa,Motoi, STANFORD UNIV CA DEPT OF COMPUTER SCIENCE, *SYSTEMS ENGINEERING,...
Improved techniques for specifying and implementing software modifications were developed including logical ripple effect analysis, logical and performance stability measures, and effective testing for software maintenance. An experiment was performed to analyze logical stability measurements. (Author)
Topics: DTIC Archive, Yau,S S, NORTHWESTERN UNIV EVANSTON IL, *COMPUTER PROGRAMS, *MAINTENANCE,...
The quest to apply an ever-increasing amount of computing power to numerical applications has resulted in the evolution of a broad spectrum of ideas and implementations for high performance computing systems. The architectural complexity of these high performance systems typically requires special tools and techniques to achieve efficient utilization of available computational resources. These tools range from automatic restructuring and optimizing compilers to interactive debugging and...
Topics: DTIC Archive, Padua, David A, ILLINOIS UNIV AT URBANA CENTER FOR SUPERCOMPUTING RESEARCH AND...
37
37
Dec 7, 2019
12/19
by
Wray, William C
texts
eye 37
favorite 2
comment 0
ix, 183 pages : 24 cm
Topics: Technisches System, Systementwurf, Microordinateur, Microcomputers -- Design and construction,...
101
101
Mar 21, 2021
03/21
by
The Bug Hunters Café
audio
eye 101
favorite 0
comment 0
Things are a bit timey-wimey at the café as M. Scott Ford chats with Bojan and Jason about legacy code, test refactoring, and what it means to be a "mender". Corgibytes: https://corgibytes.com Legacy Code Rocks!: https://www.legacycode.rocks/ M. Scott Ford (Twitter): https://twitter.com/mscottford M. Scott Ford (LinkedIn): https://linkedin.com/in/mscottford --- Music by: https://audionautix.com Sponsored by Softerrific: https://www.softerrific.com/
Topics: podcast, programming, debugging, coding
This technical memorandum proposes a methodology for the evaluation of Higher Order Programming Languages and their compilers that are to be used in the development of trusted software for secure application. The basic language issues identified are portable software, storage management, input-output, and exceptional conditions and handling. Two general techniques for resolving these issues are identified: (1) avoidance techniques whereby a language design avoids the issue, and (2) automatic...
Topics: DTIC Archive, Book,Erwin, SYSTEM DEVELOPMENT CORP MCLEAN VA, *COMPUTER PROGRAMS, *METHODOLOGY,...
12
12
Jul 5, 2020
07/20
by
unjic
movies
eye 12
favorite 0
comment 0
Watch me debug some Ruby code meant to reverse the words in a sentence without using Ruby's built-in `reverse` method. This was recorded during a live-coding session and is using an exercise from the Launch School exercises.
Topics: Ruby, Software Engineering, Coding, Programming, Launch School, Debugging
From the bitsavers.org collection, a scanned-in computer-related document. borland :: turbo assembler :: Turbo Debugger Version 4.5 Users Guide 1994
Topics: turbo, program, debugger, window, command, debugging, dialog, breakpoint, windows, pane, turbo...
From the bitsavers.org collection, a scanned-in computer-related document. cdc :: cyber :: instant :: 60305900A FORTRAN Extended Ver 3 Instant May71
Topics: program, fortran, integer, debug, data, statements, variable, logical, subscript, debugging, source...
From the bitsavers.org collection, a scanned-in computer-related document. dec :: vax :: vms :: training :: EY-2279E-SG-0002 VAX VMS Internals 1 Student Workbook Oct86
Topics: process, system, ipl, mode, mutex, code, interrupt, image, software, program, system mechanisms,...
From the bitsavers.org collection, a scanned-in computer-related document. hp :: 64700 :: software emulator :: B3637-97003 80386EX Real-Time C Debugger Sep96
Topics: command, trace, dialog, file, chapter, address, program, debugger, memory, window, command file,...
Don't kick the computer! Programs that should but won't run on your personal computer are a common source of frustration, especially if you are just beginning to write your own program or have spent hard cash for some new software. You don't have to start again at Square One or return the program. Instead, learn how to debug it yourself! This handy guide will show you howto recognize, track and eliminate bugs in your program or system. If you have some knowledge of BASIC, you can put the...
Topics: program, rats, bats, Computer Debugging, goto, data, loop, array, print, personal computer, data...
Debugging Macintosh Software with MacsBug 1991
Topics: macsbug, command, memory, heap, resource, application, file, trap, code, chapter, macsbug responds,...
Learning the language of the 8002 microprocessor - Tektronix 1977
Topics: tektronix, prototype, software, debugging, program, microprocessor, emulation, interactive,...
This document describes the algorithms and mechanisms of the MODEL Processor, which is a software system performing a program writing function. It also documents the program structure and procedures of the Processor. The MODEL Processor has been designed to automate the program design, coding and debugging of software development, based on a non-procedural specifications of a program module in the MODEL language. A program module is formally described and specified in the MODEL language, whose...
Topics: DTIC Archive, Lu,Kang-Sen, MOORE SCHOOL OF ELECTRICAL ENGINEERING PHILADELPHIA PA DEPT OF COMPUTER...
47
47
Jun 18, 2013
06/13
by
Brown, Martin C
texts
eye 47
favorite 2
comment 0
Mode of access: Internet
Topics: Debugging in computer science, Perl (Computer program language)
8
8.0
Jul 1, 2020
07/20
by
Aspinwall, Jim
texts
eye 8
favorite 0
comment 0
xvii, 285 p. : 23 cm
Topics: Debugging in computer science, Microcomputers -- Upgrading, Microcomputers -- Maintenance and repair
From the bitsavers.org collection, a scanned-in computer-related document. dec :: pdp11 :: rt11 :: v4.0 Mar80 :: 1b :: AA-5281B-T1 Introduction to RT-11 Update Mar81
Topics: program, odt, command, fortran, debugging, pointer, mov, digital, execution, format, command...
The Secure Mathematically-Assured Composition of Control Models project (SMACCM) has developed new tools for building UAV software that is provably secure against many classes of cyber-attack. The goal of the project is to provide verifiable security; that is, system designs which provide the highest levels of confidence in their security based upon verifiable evidence. The SMACCM team has developed system architecture models, software components for mission and control functions, and operating...
Topics: DTIC Archive, Cofer,Darren, Rockwell Collins Cedar Rapids United States, denial of service attack,...
The DroidSafe project developed effective program analysis techniques and tools to uncover malicious code in Android mobile applications. The core of the system is a static information flow analysis that reports the context under which sensitive information is used. The DroidSafe project invested significant time developing a comprehensive semantic model of Android run-time behaviors alongside the analysis to achieve acceptable precision, accuracy, and scalability for real-world Android...
Topics: DTIC Archive, Perkins,Jeff, Massachusetts Institute of Technology Cambridge United States, computer...
The relationship between program and specification is the core of programming theory. Since both program and specification are finite representations of infinite representations of infinite objects (the input-output behavior implemented and desired), it is not surprising that the relationship is not an effective one. Testing theory is concerned with the implications of limited program executions, with the ultimate goal of deciding a program's correctness. The difficulty at the heart of testing...
Topics: DTIC Archive, Hamlet,Dick, MARYLAND UNIV COLLEGE PARK DEPT OF COMPUTER SCIENCE, *THEORY, *TEST...
This final report describes three tasks which can strengthen the Ballistic Missile Defense Systems Command overall research objectives in software systems development. The three tasks are: Preprocessor for Verifiable PASCAL (V-PASCAL). Evaluation of Software Quality Laboratory (SQLAB) Tools and Techniques. Testing Research - A New Approach. V-PASCAL is a language designed by GRC to extend PASCAL to permit experimentaion with new language constructs which will aid in the development of BMD...
Topics: DTIC Archive, Hsia,Pei, ALABAMA UNIV IN HUNTSVILLE SCHOOL OF SCIENCE AND ENGINEERING, *COMPUTER...
The Ada Integrated Environment (AIE) consists of a set of software tools intended to support design, development and maintenance of embedded computer software. A significant portion of an AIE includes software systems and tools residing and executing on a host computer (or set of computers). This set is known as an Ada Programming Support Environment (APSE). This B-5 Specification describes, in detail, the design for a minimal APSE, claled a MAPSE.
Topics: DTIC Archive, INTERMETRICS INC CAMBRIDGE MA, *COMPUTER PROGRAMMING, *HIGH LEVEL LANGUAGES, DATA...
From the bitsavers.org collection, a scanned-in computer-related document. honeywell :: multics :: F86 multicsCommSys
Topics: fnp, mcs, fixed, bin, buffer, input, channel, output, control, multics, fixed bin, control orders,...
From the bitsavers.org collection, a scanned-in computer-related document. hp :: 64700 :: software emulator :: B3627-97002 68360 Real-Time C Debugger Jan96
Topics: command, trace, dialog, chapter, file, program, emulator, debugger, memory, source, command file,...
From the bitsavers.org collection, a scanned-in computer-related document. sgi :: iris4d :: 007-0906-030 dbx Reference Manual v3.0 1990
Topics: dbx, command, program, commands, source, print, variable, process, file, debugging, reference...
From the bitsavers.org collection, a scanned-in computer-related document. xerox :: sdd :: memos 1978 :: 19780609 Pilot Debugger
Topics: debugger, pilot, mds, code, inload, memory, pointers, virtual, file, debugging, pilot debugger,...
From the bitsavers.org collection, a scanned-in computer-related document. dec :: bliss :: EY-AY008-SP-001 BLISS Primer Volume 2 1979
Topics: bliss, primer, intermediate, volume, macro, routine, file, code, functions, compiler, primer...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-425
Topics: design, sussman, artificial, problem, intelligence, analysis, mit, debugging, circuit, program,...
15
15
texts
eye 15
favorite 0
comment 0
R Coding and Debugging Tutorial Offline/Online
Topic: R Coding and Debugging Tutorial Offline/Online