Formal Methods for Components and Objects Second International Symposium, FMCO 2003, Leiden, The Netherlands, November 4-7, 2003. Revised Lectures /

Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However, their application to more complex systems, resulting from the object-oriented and the more recent component-based software engineering paradigms, requires further deve...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Boer, Frank S. de (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Bonsangue, Marcello M. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Graf, Susanne (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), de Roever, Willem-Paul (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Έκδοση:1st ed. 2004.
Σειρά:Lecture Notes in Computer Science, 3188
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Causality and Scheduling Constraints in Heterogeneous Reactive Systems Modeling
  • Machine Function Based Control Code Algebras
  • Exploiting Abstraction for Specification Reuse. The Java/C# Case Study
  • On the Verification of Cooperating Traffic Agents
  • How to Cook a Complete Hoare Logic for Your Pet OO Language
  • Behavioural Specification for Hierarchical Object Composition
  • Consistency Management within Model-Based Object-Oriented Development of Components
  • CommUnity on the Move: Architectures for Distribution and Mobility
  • TulaFale: A Security Tool for Web Services
  • A Checker for Modal Formulae for Processes with Data
  • Semantic Essence of AsmL: Extended Abstract
  • An MDA Approach to Tame Component Based Software Development
  • An Application of Stream Calculus to Signal Flow Graphs
  • Synchronous Closing and Flow Analysis for Model Checking Timed Systems
  • Priority Systems
  • Preserving Properties under Change
  • Tools for Generating and Analyzing Attack Graphs.