LEADER 05403nam 2200625 a 450 001 9910484505003321 005 20200520144314.0 010 $a3-540-37216-4 024 7 $a10.1007/11813040 035 $a(CKB)1000000000233067 035 $a(SSID)ssj0000317675 035 $a(PQKBManifestationID)11246700 035 $a(PQKBTitleCode)TC0000317675 035 $a(PQKBWorkID)10312390 035 $a(PQKB)10457250 035 $a(DE-He213)978-3-540-37216-5 035 $a(MiAaPQ)EBC3068124 035 $a(PPN)123137225 035 $a(EXLCZ)991000000000233067 100 $a20060705d2006 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFM 2006 $eformal methods : 14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006 : proceedings /$fJayadev Misra, Tobias Nipkow, Emil Sekerinski (eds.) 205 $a1st ed. 2006. 210 $aBerlin $cSpringer$d2006 215 $a1 online resource (XV, 620 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v4085 225 1 $aLNCS sublibrary. SL 2, Programming and software engineering 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-37215-6 320 $aIncludes bibliographical references and index. 327 $aInvited Talk -- The Embedded Systems Design Challenge -- Interactive Verification -- The Mondex Challenge: Machine Checked Proofs for an Electronic Purse -- Interactive Verification of Medical Guidelines -- Certifying Airport Security Regulations Using the Focal Environment -- Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study -- Invited Talk -- Validating the Microsoft Hypervisor -- Formal Modelling of Systems -- Interface Input/Output Automata -- Properties of Behavioural Model Merging -- Automatic Translation from Circus to Java -- Quantitative Refinement and Model Checking for the Analysis of Probabilistic Systems -- Real Time -- Modeling and Validating Distributed Embedded Real-Time Systems with VDM++ -- Towards Modularized Verification of Distributed Time-Triggered Systems -- Industrial Experience -- A Story About Formal Methods Adoption by a Railway Signaling Manufacturer -- Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach -- Specification Refinement -- Compositional Class Refinement in Object-Z -- A Proposal for Records in Event-B -- Pointfree Factorization of Operation Refinement -- A Formal Template Language Enabling Metaproof -- Progrmming Languages -- Dynamic Frames: Support for Framing, Dependencies and Sharing Without Restrictions -- Type-Safe Two-Level Data Transformation -- Algebra -- Feature Algebra -- Education -- Using Domain-Independent Problems for Introducing Formal Methods -- Formal Modelling of Systems -- Compositional Binding in Network Domains -- Formal Modeling of Communication Protocols by Graph Transformation -- Feature Specification and Static Analysis for Interaction Resolution -- A Fully General Operational Semantics for UML 2.0 Sequence Diagrams with Potential and Mandatory Choice -- Formal Aspects of Java -- Towards Automatic Exception Safety Verification -- Enforcer ? Efficient Failure Injection -- Automated Boundary Test Generation from JML Specifications -- Formal Reasoning About Non-atomic Java Card Methods in Dynamic Logic -- Programming Languages -- Formal Verification of a C Compiler Front-End -- A Memory Model Sensitive Checker for C# -- Changing Programs Correctly: Refactoring with Specifications -- Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic -- Model Checking -- Model-Based Variable and Transition Orderings for Efficient Symbolic Model Checking -- Exact and Approximate Strategies for Symmetry Reduction in Model Checking -- Monitoring Distributed Controllers: When an Efficient LTL Algorithm on Sequences Is Needed to Model-Check Traces -- PSL Model Checking and Run-Time Verification Via Testers -- Industry Day: Abstracts of Invited Talks -- Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline -- Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche -- Connector-Based Software Development: Deriving Secure Protocols -- Model-Based Security Engineering for Real -- Cost Effective Software Engineering for Security -- Formal Methods and Cryptography -- Verified Software Grand Challenge. 410 0$aLecture notes in computer science ;$v4085. 410 0$aLNCS sublibrary.$nSL 2,$pProgramming and software engineering. 606 $aComputer software$xDevelopment$vCongresses 606 $aFormal methods (Computer science)$vCongresses 606 $aSystem design$xMathematics$vCongresses 615 0$aComputer software$xDevelopment 615 0$aFormal methods (Computer science) 615 0$aSystem design$xMathematics 676 $a005.3 701 $aMisra$b Jayadev$0543668 701 $aNipkow$b Tobias$f1958-$062010 701 $aSekerinski$b E$g(Emil),$f1963-$01760502 712 12$aInternational Symposium of Formal Methods Europe 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484505003321 996 $aFM 2006$94199503 997 $aUNINA