000 | 05634nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-540-37216-5 | ||
003 | DE-He213 | ||
005 | 20240730185903.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 gw | s |||| 0|eng d | ||
020 |
_a9783540372165 _9978-3-540-37216-5 |
||
024 | 7 |
_a10.1007/11813040 _2doi |
|
050 | 4 | _aQA76.758 | |
072 | 7 |
_aUMZ _2bicssc |
|
072 | 7 |
_aCOM051230 _2bisacsh |
|
072 | 7 |
_aUMZ _2thema |
|
082 | 0 | 4 |
_a005.1 _223 |
245 | 1 | 0 |
_aFM 2006: Formal Methods _h[electronic resource] : _b14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006, Proceedings / _cedited by Jayadev Misra, Tobias Nipkow, Emil Sekerinski. |
250 | _a1st ed. 2006. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2006. |
|
300 |
_aXV, 620 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aProgramming and Software Engineering, _x2945-9168 ; _v4085 |
|
505 | 0 | _aInvited Talk -- The Embedded Systems Design Challenge -- Interactive Verification -- The Mondex Challenge: Machine Checked Proofs for an Electronic Purse -- Interactive Verification of Medical Guidelines -- Certifying Airport Security Regulations Using the Focal Environment -- Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study -- Invited Talk -- Validating the Microsoft Hypervisor -- Formal Modelling of Systems -- Interface Input/Output Automata -- Properties of Behavioural Model Merging -- Automatic Translation from Circus to Java -- Quantitative Refinement and Model Checking for the Analysis of Probabilistic Systems -- Real Time -- Modeling and Validating Distributed Embedded Real-Time Systems with VDM++ -- Towards Modularized Verification of Distributed Time-Triggered Systems -- Industrial Experience -- A Story About Formal Methods Adoption by a Railway Signaling Manufacturer -- Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach -- Specification Refinement -- Compositional Class Refinement in Object-Z -- A Proposal for Records in Event-B -- Pointfree Factorization of Operation Refinement -- A Formal Template Language Enabling Metaproof -- Progrmming Languages -- Dynamic Frames: Support for Framing, Dependencies and Sharing Without Restrictions -- Type-Safe Two-Level Data Transformation -- Algebra -- Feature Algebra -- Education -- Using Domain-Independent Problems for Introducing Formal Methods -- Formal Modelling of Systems -- Compositional Binding in Network Domains -- Formal Modeling of Communication Protocols by Graph Transformation -- Feature Specification and Static Analysis for Interaction Resolution -- A Fully General Operational Semantics for UMLÂ 2.0 SequenceDiagrams with Potential and Mandatory Choice -- Formal Aspects of Java -- Towards Automatic Exception Safety Verification -- Enforcer - Efficient Failure Injection -- Automated Boundary Test Generation from JML Specifications -- Formal Reasoning About Non-atomic Java Card Methods in Dynamic Logic -- Programming Languages -- Formal Verification of a C Compiler Front-End -- A Memory Model Sensitive Checker for C# -- Changing Programs Correctly: Refactoring with Specifications -- Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic -- Model Checking -- Model-Based Variable and Transition Orderings for Efficient Symbolic Model Checking -- Exact and Approximate Strategies for Symmetry Reduction in Model Checking -- Monitoring Distributed Controllers: When an Efficient LTL Algorithm on Sequences Is Needed to Model-Check Traces -- PSL Model Checking and Run-Time Verification Via Testers -- Industry Day: Abstracts of Invited Talks -- Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline -- Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche -- Connector-Based Software Development: Deriving Secure Protocols -- Model-Based Security Engineering for Real -- Cost Effective Software Engineering for Security -- Formal Methods and Cryptography -- Verified Software Grand Challenge. | |
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aCompilers (Computer programs). _93350 |
|
650 | 0 |
_aComputer programming. _94169 |
|
650 | 0 |
_aMachine theory. _9140769 |
|
650 | 1 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputer Science Logic and Foundations of Programming. _942203 |
650 | 2 | 4 |
_aCompilers and Interpreters. _931853 |
650 | 2 | 4 |
_aProgramming Techniques. _9140770 |
650 | 2 | 4 |
_aFormal Languages and Automata Theory. _9140771 |
700 | 1 |
_aMisra, Jayadev. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9140772 |
|
700 | 1 |
_aNipkow, Tobias. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9140773 |
|
700 | 1 |
_aSekerinski, Emil. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9140774 |
|
710 | 2 |
_aSpringerLink (Online service) _9140775 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540372158 |
776 | 0 | 8 |
_iPrinted edition: _z9783540827566 |
830 | 0 |
_aProgramming and Software Engineering, _x2945-9168 ; _v4085 _9140776 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/11813040 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93015 _d93015 |