6th Refinement Workshop

6th Refinement Workshop PDF Author: David Till
Publisher: Springer Science & Business Media
ISBN: 1447132408
Category : Mathematics
Languages : en
Pages : 315

Get Book Here

Book Description
The Sixth Refinement Workshop took place at City University in London from 5th to 7th January 1994. The present volume includes all of the papers which were submitted and accepted for presentation, together with two papers by invited speakers. The workshops in the series have generally occurred at one year intervals but in this last case a two year period had elapsed. These workshops have established themselves as an important event in the calendar for all those who are interested in progress in the underlying theory of refinement and in the take-up by industry of the methods supported by that theory. One of the proposed themes of the sixth workshop was the reporting of successful adoption in industry of rigorous software development methods. The programme committee was perhaps slightly disappointed by the response from industry to the call in this respect. However, the recent period could be characterised as one of consolidation, when those companies which have made the decision that formal development methods are important to their business have been adopting them where appropriate and finding them to be worthwhile. On the other hand,. the difficult economic climate which exists in most parts of the developed world is perhaps not the context within which companies still dubious about the benefits are goil'\g to opt for making major changes in their working practices.

6th Refinement Workshop

6th Refinement Workshop PDF Author: David Till
Publisher: Springer Science & Business Media
ISBN: 1447132408
Category : Mathematics
Languages : en
Pages : 315

Get Book Here

Book Description
The Sixth Refinement Workshop took place at City University in London from 5th to 7th January 1994. The present volume includes all of the papers which were submitted and accepted for presentation, together with two papers by invited speakers. The workshops in the series have generally occurred at one year intervals but in this last case a two year period had elapsed. These workshops have established themselves as an important event in the calendar for all those who are interested in progress in the underlying theory of refinement and in the take-up by industry of the methods supported by that theory. One of the proposed themes of the sixth workshop was the reporting of successful adoption in industry of rigorous software development methods. The programme committee was perhaps slightly disappointed by the response from industry to the call in this respect. However, the recent period could be characterised as one of consolidation, when those companies which have made the decision that formal development methods are important to their business have been adopting them where appropriate and finding them to be worthwhile. On the other hand,. the difficult economic climate which exists in most parts of the developed world is perhaps not the context within which companies still dubious about the benefits are goil'\g to opt for making major changes in their working practices.

Asynchronous Digital Circuit Design

Asynchronous Digital Circuit Design PDF Author: Graham Birtwistle
Publisher: Springer Science & Business Media
ISBN: 144713575X
Category : Mathematics
Languages : en
Pages : 272

Get Book Here

Book Description
As the costs of power and timing become increasingly difficult to manage in traditional synchronous systems, designers are being forced to look at asynchronous alternatives. Based on reworked and expanded papers from the VII Banff Higher Order Workshop, this volume examines asynchronous methods which have been used in large circuit design, ranging from initial formal specification to more standard finite state machine based control models. Written by leading practitioners in the area, the papers cover many aspects of current practice including practical design, silicon compilation, and applications of formal specification. It also includes a state-of-the-art survey of asynchronous hardware design. The resulting volume will be invaluable to anyone interested in designing correct asynchronous circuits which exhibit high performance or low power operation.

Concurrency, Compositionality, and Correctness

Concurrency, Compositionality, and Correctness PDF Author: Dennis Dams
Publisher: Springer Science & Business Media
ISBN: 364211511X
Category : Computers
Languages : en
Pages : 383

Get Book Here

Book Description
This Festschrift volume, published in honor of Willem-Paul de Roever, contains 19 detailed papers written by the friends and colleagues of the honoree, all eminent scientists in their own right. These are preceded by a detailed bibliography and rounded off, at the end of the book, with a gallery of photographs. The theme under which the papers have been collected is Concurrency, Compositionality, and Correctness, reflecting the focus of Willem-Paul de Roever's research career. Topics addressed include model checking, computer science and state machines, ontology and mereology of domains, game theory, compiler correctness, fair scheduling and encryption algorithms.

Specification in B

Specification in B PDF Author: Kevin Lano
Publisher: World Scientific
ISBN: 9781860940088
Category : Computers
Languages : en
Pages : 264

Get Book Here

Book Description
This book gives a practical introduction to the B specification language and method, an approach to the development of high-quality software using rigorous CASE techniques.It is suitable for both undergraduate and postgraduate courses, in addition to being an introduction for industrial practitioners. Extensive examples of all development life-cycle stages are given, including animation, proof, design and code generation in C. Two large case studies and exercises with solutions are provided.The authors have extensive experience in teaching B and in its industrial application to high integrity systems. The book uses the B Toolkit to support the text, but it is also relevant to users of alternative toolsets for B.

The B Language and Method

The B Language and Method PDF Author: Kevin Lano
Publisher: Springer Science & Business Media
ISBN: 1447114949
Category : Computers
Languages : en
Pages : 240

Get Book Here

Book Description
B is one of the few formal methods which has robust, commercially-available tool support for the entire development lifecycle from specification through to code generation. This volume provides a comprehensive introduction to the B Abstract Machine Notation, and to how it can be used to support formal specification and development of high integrity systems. A strong emphasis is placed on the use of B in the context of existing software development methods, including object-oriented analysis and design. The text includes a large number of worked examples, graduated exercises in B AMN specification and development (all of which have been class-tested), two extended case studies of the development process, and an appendix of proof techniques suitable for B. Based on material which has been used to teach B at postgraduate and undergraduate level, this volume will provide invaluable reading a wide range of people, including students, project technical managers and workers, and researchers with an interest in methods integration and B semantics.

TAPSOFT '95: Theory and Practice of Software Development

TAPSOFT '95: Theory and Practice of Software Development PDF Author: Peter D. Mosses
Publisher: Springer Science & Business Media
ISBN: 9783540592938
Category : Computers
Languages : en
Pages : 836

Get Book Here

Book Description
This volume presents the proceedings of the Sixth International Joint Conference on the Theory and Practice of Software Engineering, TAPSOFT '95, held in Aarhus, Denmark in May 1995. TAPSOFT '95 celebrates the 10th anniversary of this conference series started in Berlin in 1985 to bring together theoretical computer scientists and software engineers (researchers and practitioners) with a view to discussing how formal methods can usefully be applied in software development. The volume contains seven invited papers, among them one by Vaugham Pratt on the recently revealed bug in the Pentium chip, and 44 revised full papers selected from a total of 147 submissions. In addition the TAPSOFT '95 proceedings contains 10 tool descriptions.

Formal Object-Oriented Development

Formal Object-Oriented Development PDF Author: Kevin Lano
Publisher: Springer Science & Business Media
ISBN: 1447130731
Category : Computers
Languages : en
Pages : 435

Get Book Here

Book Description
Formal Object-Oriented Development provides a comprehensive overview of the use of formal object-oriented methods; it covers how and where they should be introduced into the development process, how they can be introduced selectively for critical parts of an application, and how to incorporate them effectively into existing deveopmental practices. The text is extensively illustrated, both with tutorial and self-assessment excercises and with examples of industrial applications from the reactive systems domain. This book will be of interest to academic and industrial researchers, software engineering practitioners and consultants, and will also provide invaluable reading material for students learning Z++ and VDM++.

Handbook of Research on Mobile Software Engineering: Design, Implementation, and Emergent Applications

Handbook of Research on Mobile Software Engineering: Design, Implementation, and Emergent Applications PDF Author: Alencar, Paulo
Publisher: IGI Global
ISBN: 1615206566
Category : Computers
Languages : en
Pages : 1040

Get Book Here

Book Description
The popularity of an increasing number of mobile devices, such as PDAs, laptops, smart phones, and tablet computers, has made the mobile device the central method of communication in many societies. These devices may be used as electronic wallets, social networking tools, or may serve as a person’s main access point to the World Wide Web. The Handbook of Research on Mobile Software Engineering: Design, Implementation, and Emergent Applications highlights state-of-the-art research concerning the key issues surrounding current and future challenges associated with the software engineering of mobile systems and related emergent applications. This handbook addresses gaps in the literature within the area of software engineering and the mobile computing world.

FME 2002: Formal Methods - Getting IT Right

FME 2002: Formal Methods - Getting IT Right PDF Author: Lars-Henrik Eriksson
Publisher: Springer Science & Business Media
ISBN: 3540439285
Category : Business & Economics
Languages : en
Pages : 636

Get Book Here

Book Description
This book constitutes the refereed proceedings of the international symposium Formal Methods Europe, FME 2002, held in Copenhagen, Denmark, in July 2002. The 31 revised full papers presented together with three invited contributions were carefully reviewed and selected from 95 submissions. All current aspects of formal methods are addressed, from foundational and methodological issues to advanced application in various fields.

Operational Semantics and Verification of Security Protocols

Operational Semantics and Verification of Security Protocols PDF Author: Cas Cremers
Publisher: Springer Science & Business Media
ISBN: 3540786368
Category : Computers
Languages : en
Pages : 176

Get Book Here

Book Description
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool. The methodology’s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.