LEADER 00791nam0-22002891i-450- 001 990000368650403321 005 20030901121335.0 010 $a0-12-117645-2 035 $a000036865 035 $aFED01000036865 035 $a(Aleph)000036865FED01 035 $a000036865 100 $a20020821d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aMathematical TEX by example$f(by) Arvind Borde 210 $aBoston$cAcademic Press Inc.$dc1993 215 $aXI, 352 p.$d24 cm 676 $a686.225 44 700 1$aBorde,$bArvind$021502 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000368650403321 952 $a04 013-275$bDIC 9/L/CDB$fDINCH 959 $aDINCH 996 $aMathematical TEX by example$9126510 997 $aUNINA LEADER 08851nam 22008175 450 001 9910483513503321 005 20251226195858.0 010 $a3-642-16558-3 024 7 $a10.1007/978-3-642-16558-0 035 $a(CKB)2670000000056646 035 $a(SSID)ssj0000446594 035 $a(PQKBManifestationID)11923941 035 $a(PQKBTitleCode)TC0000446594 035 $a(PQKBWorkID)10497081 035 $a(PQKB)11163455 035 $a(DE-He213)978-3-642-16558-0 035 $a(MiAaPQ)EBC3066057 035 $a(PPN)14989077X 035 $a(BIP)32335127 035 $a(EXLCZ)992670000000056646 100 $a20101102d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aLeveraging Applications of Formal Methods, Verification, and Validation $e4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I /$fedited by Tiziana Margaria, Bernhard Steffen 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XX, 708 p. 220 illus.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v6415 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-16557-5 320 $aIncludes bibliographical references and index. 327 $aNew Challenges in the Development of Critical Embedded Systems ? An ?aeromotive? Perspective -- New Challenges in the Development of Critical Embedded Systems?An ?aeromotive? Perspective -- Certification of Embedded Software ? Impact of ISO DIS 26262 in the Automotive Domain -- Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns -- Seamless Model-Driven Development Put into Practice -- Timely Time Estimates -- Compiler-Support for Robust Multi-core Computing -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Analyzing the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method -- Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset -- Contract-Based Slicing -- Worst-Case Traversal Time (WCTT) -- Special Track on Worst Case Traversal Time (WCTT) -- The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus -- NC-Maude: A Rewriting Tool to Play with Network Calculus -- DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems -- A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling -- Flow Control with (Min,+) Algebra -- An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks -- Towards Resource-Optimal Routing Plans for Real-Time Traffic -- Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet -- Analyzing End-to-End Functional Delays on an IMA Platform -- Tools in Scientific Workflow Composition -- Toolsin Scientific Workflow Composition -- Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction -- Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL -- Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy -- Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins -- Workflow Construction for Service-Oriented Knowledge Discovery -- Workflow Composition and Enactment Using jORCA -- A Linked Data Approach to Sharing Workflows and Workflow Results -- Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things -- Towards More Adaptive Voice Applications -- Telco Service Delivery Platforms in the Last Decade - A R&D Perspective -- Ontology-Driven Pervasive Service Composition for Everyday Life -- Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects -- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution -- Relay Placement Problem in Smart Grid Deployment -- Web Science -- Towards a Research Agenda for Enterprise Crowdsourcing -- Analyzing Collaboration in Software Development Processes through Social Networks -- A Web-Based Framework for Collaborative Innovation -- A Distributed Dynamics for WebGraph Decontamination -- Increasing Users? Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model -- Understanding IT Organizations -- On the 2-Categorical View of Proofs -- Model Transformation and Analysis for Industrial Scale Validation -- WOMM: A Weak Operational Memory Model -- A Memory Model for Static Analysis of C Programs -- Analysing Message Sequence Graph Specifications -- OptimizeContext-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination -- A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL -- SPARDL: A Requirement Modeling Language for Periodic Control System -- AutoPA: Automatic Prototyping from Requirements -- Systematic Model-Based Safety Assessment Via Probabilistic Model Checking -- Learning Techniques for Software Verification and Validation -- Learning Techniques for Software Verification and Validation ? Special Track at ISoLA 2010 -- Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning -- Inferring Compact Models of Communication Protocol Entities -- Inference and Abstraction of the Biometric Passport -- From ZULU to RERS. 330 $aThis volume contains the conference proceedings of the 4th International S- posium on Leveraging Applications of Formal Methods, Veri'cation and Vali- tion, ISoLA 2010, which was held in Greece (Heraklion, Crete) October 18-21, 2010, and sponsored by EASST. Following the tradition of its forerunners in 2004, 2006, and 2008 in Cyprus and Chalchidiki, and the ISoLA Workshops in Greenbelt (USA) in 2005, in Poitiers (France) in 2007, and in Potsdam (Germany) in 2009, ISoLA 2010 p- vided a forum for developers, users, and researchers to discuss issues related to the adoption and use of rigorous tools and methods for the speci'cation, ana- sis, veri'cation, certi'cation, construction, testing, and maintenance of systems from the point of view of their di'erent application domains. Thus, the ISoLA series of events serves the purpose of bridging the gap between designers and developers of rigorous tools, and users in engineering and in other disciplines, and to foster and exploit synergetic relationships among scientists, engineers, software developers, decision makers, and other critical thinkers in companies and organizations. In particular, by providing a venue for the discussion of c- mon problems, requirements, algorithms, methodologies, and practices, ISoLA aims at supporting researchers in their quest to improve the utility, reliability, ?exibility, and e'ciency of tools for building systems, and users in their search for adequate solutions to their problems. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v6415 606 $aComputer networks 606 $aComputer science 606 $aSoftware engineering 606 $aCompilers (Computer programs) 606 $aApplication software 606 $aData mining 606 $aComputer Communication Networks 606 $aComputer Science Logic and Foundations of Programming 606 $aSoftware Engineering 606 $aCompilers and Interpreters 606 $aComputer and Information Systems Applications 606 $aData Mining and Knowledge Discovery 615 0$aComputer networks. 615 0$aComputer science. 615 0$aSoftware engineering. 615 0$aCompilers (Computer programs). 615 0$aApplication software. 615 0$aData mining. 615 14$aComputer Communication Networks. 615 24$aComputer Science Logic and Foundations of Programming. 615 24$aSoftware Engineering. 615 24$aCompilers and Interpreters. 615 24$aComputer and Information Systems Applications. 615 24$aData Mining and Knowledge Discovery. 676 $a004.6 701 $aMargaria-Steffen$b Tiziana$f1964-$0845731 701 $aSteffen$b Bernhard$0878620 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483513503321 996 $aLeveraging applications of formal methods, verification, and validation$94186892 997 $aUNINA