Normal view MARC view ISBD view

Leveraging Applications of Formal Methods, Verification, and Validation [electronic resource] : 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I / edited by Tiziana Margaria, Bernhard Steffen.

Contributor(s): Margaria, Tiziana [editor.] | Steffen, Bernhard [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Theoretical Computer Science and General Issues: 6415Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010Edition: 1st ed. 2010.Description: XX, 708 p. 220 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642165580.Subject(s): Computer networks  | Computer science | Software engineering | Compilers (Computer programs) | Application software | Data mining | Computer Communication Networks | Computer Science Logic and Foundations of Programming | Software Engineering | Compilers and Interpreters | Computer and Information Systems Applications | Data Mining and Knowledge DiscoveryAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access online
Contents:
New Challenges in the Development of Critical Embedded Systems - An "aeromotive" Perspective -- New Challenges in the Development of Critical Embedded Systems-An "aeromotive" Perspective -- Certification of Embedded Software - Impact of ISO DIS 26262 in the Automotive Domain -- Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns -- Seamless Model-Driven Development Put into Practice -- Timely Time Estimates -- Compiler-Support for Robust Multi-core Computing -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Analyzing the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method -- Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset -- Contract-Based Slicing -- Worst-Case Traversal Time (WCTT) -- Special Track on Worst Case Traversal Time (WCTT) -- The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus -- NC-Maude: A Rewriting Tool to Play with Network Calculus -- DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems -- A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling -- Flow Control with (Min,+) Algebra -- An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks -- Towards Resource-Optimal Routing Plans for Real-Time Traffic -- Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet -- Analyzing End-to-End Functional Delays on an IMA Platform -- Tools in Scientific Workflow Composition -- Toolsin Scientific Workflow Composition -- Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction -- Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL -- Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy -- Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins -- Workflow Construction for Service-Oriented Knowledge Discovery -- Workflow Composition and Enactment Using jORCA -- A Linked Data Approach to Sharing Workflows and Workflow Results -- Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things -- Towards More Adaptive Voice Applications -- Telco Service Delivery Platforms in the Last Decade - A R&D Perspective -- Ontology-Driven Pervasive Service Composition for Everyday Life -- Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects -- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution -- Relay Placement Problem in Smart Grid Deployment -- Web Science -- Towards a Research Agenda for Enterprise Crowdsourcing -- Analyzing Collaboration in Software Development Processes through Social Networks -- A Web-Based Framework for Collaborative Innovation -- A Distributed Dynamics for WebGraph Decontamination -- Increasing Users' Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model -- Understanding IT Organizations -- On the 2-Categorical View of Proofs -- Model Transformation and Analysis for Industrial Scale Validation -- WOMM: A Weak Operational Memory Model -- A Memory Model for Static Analysis of C Programs -- Analysing Message Sequence Graph Specifications -- OptimizeContext-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination -- A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL -- SPARDL: A Requirement Modeling Language for Periodic Control System -- AutoPA: Automatic Prototyping from Requirements -- Systematic Model-Based Safety Assessment Via Probabilistic Model Checking -- Learning Techniques for Software Verification and Validation -- Learning Techniques for Software Verification and Validation - Special Track at ISoLA 2010 -- Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning -- Inferring Compact Models of Communication Protocol Entities -- Inference and Abstraction of the Biometric Passport -- From ZULU to RERS.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

New Challenges in the Development of Critical Embedded Systems - An "aeromotive" Perspective -- New Challenges in the Development of Critical Embedded Systems-An "aeromotive" Perspective -- Certification of Embedded Software - Impact of ISO DIS 26262 in the Automotive Domain -- Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns -- Seamless Model-Driven Development Put into Practice -- Timely Time Estimates -- Compiler-Support for Robust Multi-core Computing -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Analyzing the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method -- Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset -- Contract-Based Slicing -- Worst-Case Traversal Time (WCTT) -- Special Track on Worst Case Traversal Time (WCTT) -- The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus -- NC-Maude: A Rewriting Tool to Play with Network Calculus -- DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems -- A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling -- Flow Control with (Min,+) Algebra -- An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks -- Towards Resource-Optimal Routing Plans for Real-Time Traffic -- Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet -- Analyzing End-to-End Functional Delays on an IMA Platform -- Tools in Scientific Workflow Composition -- Toolsin Scientific Workflow Composition -- Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction -- Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL -- Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy -- Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins -- Workflow Construction for Service-Oriented Knowledge Discovery -- Workflow Composition and Enactment Using jORCA -- A Linked Data Approach to Sharing Workflows and Workflow Results -- Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things -- Towards More Adaptive Voice Applications -- Telco Service Delivery Platforms in the Last Decade - A R&D Perspective -- Ontology-Driven Pervasive Service Composition for Everyday Life -- Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects -- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution -- Relay Placement Problem in Smart Grid Deployment -- Web Science -- Towards a Research Agenda for Enterprise Crowdsourcing -- Analyzing Collaboration in Software Development Processes through Social Networks -- A Web-Based Framework for Collaborative Innovation -- A Distributed Dynamics for WebGraph Decontamination -- Increasing Users' Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model -- Understanding IT Organizations -- On the 2-Categorical View of Proofs -- Model Transformation and Analysis for Industrial Scale Validation -- WOMM: A Weak Operational Memory Model -- A Memory Model for Static Analysis of C Programs -- Analysing Message Sequence Graph Specifications -- OptimizeContext-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination -- A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL -- SPARDL: A Requirement Modeling Language for Periodic Control System -- AutoPA: Automatic Prototyping from Requirements -- Systematic Model-Based Safety Assessment Via Probabilistic Model Checking -- Learning Techniques for Software Verification and Validation -- Learning Techniques for Software Verification and Validation - Special Track at ISoLA 2010 -- Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning -- Inferring Compact Models of Communication Protocol Entities -- Inference and Abstraction of the Biometric Passport -- From ZULU to RERS.

There are no comments for this item.

Log in to your account to post a comment.