Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Texas at El Paso

Documentation

PDF

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar Jan 2010

Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar

Departmental Technical Reports (CS)

The Java Modeling Language (JML) is a formal behavioral interface specification language for Java. It is used for detailed design documentation of Java program modules such as classes and interfaces. JML has been used extensively by many researchers across various projects and has a large and varied spectrum of tool support. It extends from runtime assertion checking (RAC) to theorem proving.

Amongst these tools, RAC and ESC/Java has been used as a common tool for many research projects. RAC for JML is a tool that checks at runtime for possible violations of any specifications. However, lately there has been a …


Toward A More Accurate View Of When And How People Seek Help With Computer Applications, David G. Novick, Edith Elizalde, Nathaniel Bean Oct 2007

Toward A More Accurate View Of When And How People Seek Help With Computer Applications, David G. Novick, Edith Elizalde, Nathaniel Bean

Departmental Papers (CS)

Based on 40 interviews and 11 on-site workplace observations of people using computer applications at work, we confirm that use of printed and on-line help is very low and find that providing greater detail of categories solution methods can present a more realistic picture of users’ behaviors. Observed study participants encountered a usability problem on average about once every 75 minutes and typically spent about a minute looking for a solution. Participants consumed much more time when they were unaware of a direct way of doing something and instead used less effective methods. Comparison of results from different data-collection methods …