Formal Methods for Components and Objects Second International Symposium, FMCO 2003, Leiden, The Netherlands, November 4-7, 2003. Revised Lectures /

Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However, their application to more complex systems, resulting from the object-oriented and the more recent component-based software engineering paradigms, requires further deve...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Boer, Frank S. de (Editor, http://id.loc.gov/vocabulary/relators/edt), Bonsangue, Marcello M. (Editor, http://id.loc.gov/vocabulary/relators/edt), Graf, Susanne (Editor, http://id.loc.gov/vocabulary/relators/edt), de Roever, Willem-Paul (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Edition:1st ed. 2004.
Series:Lecture Notes in Computer Science, 3188
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Causality and Scheduling Constraints in Heterogeneous Reactive Systems Modeling
  • Machine Function Based Control Code Algebras
  • Exploiting Abstraction for Specification Reuse. The Java/C# Case Study
  • On the Verification of Cooperating Traffic Agents
  • How to Cook a Complete Hoare Logic for Your Pet OO Language
  • Behavioural Specification for Hierarchical Object Composition
  • Consistency Management within Model-Based Object-Oriented Development of Components
  • CommUnity on the Move: Architectures for Distribution and Mobility
  • TulaFale: A Security Tool for Web Services
  • A Checker for Modal Formulae for Processes with Data
  • Semantic Essence of AsmL: Extended Abstract
  • An MDA Approach to Tame Component Based Software Development
  • An Application of Stream Calculus to Signal Flow Graphs
  • Synchronous Closing and Flow Analysis for Model Checking Timed Systems
  • Priority Systems
  • Preserving Properties under Change
  • Tools for Generating and Analyzing Attack Graphs.