|
|
|
|
LEADER |
05351nam a22005895i 4500 |
001 |
978-3-540-68237-0 |
003 |
DE-He213 |
005 |
20151204143551.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540682370
|9 978-3-540-68237-0
|
024 |
7 |
|
|a 10.1007/978-3-540-68237-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.758
|
072 |
|
7 |
|a UMZ
|2 bicssc
|
072 |
|
7 |
|a UL
|2 bicssc
|
072 |
|
7 |
|a COM051230
|2 bisacsh
|
082 |
0 |
4 |
|a 005.1
|2 23
|
245 |
1 |
0 |
|a FM 2008: Formal Methods
|h [electronic resource] :
|b 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 Proceedings /
|c edited by Jorge Cuellar, Tom Maibaum, Kaisa Sere.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2008.
|
300 |
|
|
|a XIII, 436 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5014
|
505 |
0 |
|
|a Session 1. Invited Talks -- Aspects and Formal Methods -- Getting Formal Verification into Design Flow -- Lessons in the Weird and Unexpected: Some Experiences from Checking Large Real Systems -- Simulation, Orchestration and Logical Clocks -- Session 2. Programming Language Analysis -- CoVaC: Compiler Validation by Program Analysis of the Cross-Product -- Lazy Behavioral Subtyping -- Checking Well-Formedness of Pure-Method Specifications -- Session 3. Verification -- Verifying Dynamic Pointer-Manipulating Threads -- Proofs and Refutations for Probabilistic Refinement -- Assume-Guarantee Verification for Interface Automata -- Session 4. Real-Time and Concurrency -- Automated Verification of Dense-Time MTL Specifications Via Discrete-Time Approximation -- A Model Checking Language for Concurrent Value-Passing Systems -- Session 5. Grand Chellenge Problems -- Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code -- Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM -- Session 6. FM Practice -- Industrial Use of Formal Methods for a High-Level Security Evaluation -- Secret Ninja Formal Methods -- Specification and Checking of Software Contracts for Conditional Information Flow -- Session 7. Runtime Moitoring and Analysis -- JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity -- Provably Correct Runtime Monitoring -- Session 8. Communication -- A Schedulerless Semantics of TLM Models Written in SystemC Via Translation into LOTOS -- A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service -- Session 9. Constraint Analysis -- Constraint Prioritization for Efficient Analysis of Declarative Models -- Finding Minimal Unsatisfiable Cores of Declarative Specifications -- Precise Interval Analysis vs. Parity Games -- Session 10. Design -- Introducing Objects through Refinement -- Masking Faults While Providing Bounded-Time Phased Recovery -- Towards Consistent Specifications of Product Families -- Session 11. Industry Day -- Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution -- An Industrial Case: Pitfalls and Benefits of Applying Formal Methods to the Development of a Network-Centric RTOS -- Software Engineering with Formal Methods: Experiences with the Development of a Storm Surge Barrier Control System -- Application of a Formal Specification Language in the Development of the “Mobile FeliCa” IC Chip Firmware for Embedding in Mobile Phone -- Safe and Reliable Metro Platform Screen Doors Control/Command Systems.
|
520 |
|
|
|a This book presents the refereed proceedings of the 15th International Symposium on Formal Methods, FM 2008, held in Turku, Finland in May 2008. The 23 revised full papers presented together with 4 invited contributions and extended abstracts of 5 invited industrial presentations were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on programming language analysis, verification, real-time and concurrency, grand chellenge problems, fm practice, runtime monitoring and analysis, communication, constraint analysis, and design.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Programming languages (Electronic computers).
|
650 |
|
0 |
|a Computer logic.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|
650 |
2 |
4 |
|a Computer Engineering.
|
650 |
2 |
4 |
|a Programming Techniques.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Logics and Meanings of Programs.
|
650 |
2 |
4 |
|a Programming Languages, Compilers, Interpreters.
|
700 |
1 |
|
|a Cuellar, Jorge.
|e editor.
|
700 |
1 |
|
|a Maibaum, Tom.
|e editor.
|
700 |
1 |
|
|a Sere, Kaisa.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540682356
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5014
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-540-68237-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|