LEADER 03074nam 22006133u 450 001 9910790478503321 005 20230801221503.0 010 $a1-136-73577-1 010 $a0-203-81838-5 035 $a(CKB)2670000000148188 035 $a(EBL)801827 035 $a(OCoLC)797919153 035 $a(SSID)ssj0000612731 035 $a(PQKBManifestationID)11374966 035 $a(PQKBTitleCode)TC0000612731 035 $a(PQKBWorkID)10570304 035 $a(PQKB)10931823 035 $a(MiAaPQ)EBC801827 035 $a(EXLCZ)992670000000148188 100 $a20130418d2012|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRegulating the International Movement of Women$b[electronic resource] $eFrom Protection to Control 210 $aHoboken $cTaylor and Francis$d2012 215 $a1 online resource (217 p.) 300 $aDescription based upon print version of record. 311 $a0-415-81525-8 311 $a0-415-57949-X 327 $aCover; Regulating the Internationa lMovement of Women; Copyright; Contents; Notes on contributors; Acknowledgements; Introduction; PART I : Vulnerability and citizenship; Chapter 1. Constructing vulnerabilities and managing risk: State responses to forced marriage; Chapter 2. Safe spaces for dykes in danger? Refugee law's production of vulnerable lesbians; Chapter 3. Roma, free movement and gendered exclusion in the enlarged European Union; PART II : Vulnerability and race; Chapter 4. Life on the margins: A feminist counter-topography of H-2B workers 327 $aChapter 5. Vulnerability, silence and pathways to resistance: The case of migrant women in GreeceChapter 6. Crossing borders, inhabiting spaces: The (in)credibility of sexual violence in asylum appeals; PART III : Vulnerability and sex trafficking; Chapter 7. Perspectives on trafficking and the Policing and Crime Act 2009: Challenging notions of vulnerability through a Butlerian lens; Chapter 8. Vulnerability and sex trafficking in the United Kingdom; Chapter 9. Moral and legal obligations of the state to victims of sex trafficking: Vulnerability and beyond; Index 606 $aWomen immigrants - Legal status, laws, etc 606 $aWomen immigrants -- Legal status, laws, etc 606 $aWomen immigrants$xLegal status, laws, etc 606 $aLaw, Politics & Government$2HILCC 606 $aLaw, General & Comparative$2HILCC 615 4$aWomen immigrants - Legal status, laws, etc. 615 4$aWomen immigrants -- Legal status, laws, etc. 615 0$aWomen immigrants$xLegal status, laws, etc 615 7$aLaw, Politics & Government 615 7$aLaw, General & Comparative 676 $a305.48/96912 676 $a305.4896912 700 $aFitzgerald$b Sharron A$01142999 702 $aFitzGerald$b Sharron A 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910790478503321 996 $aRegulating the International Movement of Women$93811962 997 $aUNINA LEADER 05781nam 2200805 a 450 001 9910821368103321 005 20240313144213.0 010 $a9781118602867 010 $a1118602862 010 $a9781118602959 010 $a1118602951 010 $a9781118602843 010 $a1118602846 010 $a9781299187788 010 $a1299187781 035 $a(CKB)2550000001005909 035 $a(EBL)1124674 035 $a(OCoLC)828298908 035 $a(SSID)ssj0000832009 035 $a(PQKBManifestationID)11521864 035 $a(PQKBTitleCode)TC0000832009 035 $a(PQKBWorkID)10882198 035 $a(PQKB)11028278 035 $a(OCoLC)828198486 035 $a(MiAaPQ)EBC1124674 035 $a(Au-PeEL)EBL1124674 035 $a(CaPaEBR)ebr10660561 035 $a(CaONFJC)MIL450028 035 $a(OCoLC)769469644 035 $a(FINmELB)ELB178712 035 $a(Perlego)1013435 035 $a(EXLCZ)992550000001005909 100 $a20111021d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aStatic analysis of software $ethe abstract interpretation /$fedited by Jean-Louis Boulanger 205 $a1st ed. 210 $aHoboken, N.J. $cWiley$d2012 215 $a1 online resource (347 p.) 225 1 $aISTE 300 $aDescription based upon print version of record. 311 08$a9781848213203 311 08$a1848213204 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Formal Techniques for Verification and Validation; 1.1. Introduction; 1.2. Realization of a software application; 1.3. Characteristics of a software application; 1.4. Realization cycle; 1.4.1. Cycle in V and other realization cycles; 1.4.2. Quality control (the impact of ISO standard 9001); 1.4.3. Verification and validation; 1.5. Techniques, methods and practices; 1.5.1. Static verification; 1.5.2. Dynamic verification; 1.5.3. Validation; 1.6. New issues with verification and validation; 1.7. Conclusion 327 $a1.8. BibliographyChapter 2. Airbus: Formal Verification in Avionics; 2.1. Industrial context; 2.1.1. Avionic systems; 2.1.2. A few examples; 2.1.3. Regulatory framework; 2.1.4. Avionic functions; 2.1.5. Development of avionics levels; 2.2. Two methods for formal verification; 2.2.1. General principle of program proof; 2.2.2. Static analysis by abstract interpretation; 2.2.3. Program proof by calculation of the weakest precondition; 2.3. Four formal verification tools; 2.3.1. Caveat; 2.3.2. Proof of the absence of run-time errors: Astre?e; 2.3.3. Stability and numerical precision: Fluctuat 327 $a2.3.4. Calculation of the worst case execution time: aiT (AbsInt GmbH)2.4. Examples of industrial use; 2.4.1. Unitary proof (verification of low level requirements); 2.4.2. The calculation of worst case execution time; 2.4.3. Proof of the absence of run-time errors; 2.5. Bibliography; Chapter 3. Polyspace; 3.1. Overview; 3.2. Introduction to software quality and verification procedures; 3.3. Static analysis; 3.4. Dynamic tests; 3.5. Abstract interpretation; 3.6. Code verification; 3.7. Robustness verification or contextual verification; 3.7.1. Robustness verifications 327 $a3.7.2. Contextual verification3.8. Examples of PolyspaceŽ results; 3.8.1. Example of safe code; 3.8.2. Example: dereferencing of a pointer outside its bounds; 3.8.3. Example: inter-procedural calls; 3.9. Carrying out a code verification with Polyspace; 3.10. Use of PolyspaceŽ can improve the quality of embedded software; 3.10.1. Begin by establishing models and objectives for software quality; 3.10.2. Example of a software quality model with objectives; 3.10.3. Use of a subset of languages to satisfy coding rules; 3.10.4. Use of PolyspaceŽ to reach software quality objectives 327 $a3.11. Carrying out certification with PolyspaceŽ3.12. The creation of critical onboard software; 3.13. Concrete uses of PolyspaceŽ; 3.13.1. Automobile: Cummins Engines improves the reliability of its motor's controllers; 3.13.2. Aerospace: EADS guarantees the reliability of satellite launches; 3.13.3. Medical devices: a code analysis leads to a recall of the device; 3.13.4. Other examples of the use of PolyspaceŽ; 3.14. Conclusion; 3.15. Bibliography; Chapter 4. Software Robustness with Regards to Dysfunctional Values from Static Analysis; 4.1. Introduction; 4.2. Normative context 327 $a4.3. Elaboration of the proof of the robustness method 330 $aThe existing literature currently available to students and researchers is very general, covering only the formal techniques of static analysis. This book presents real examples of the formal techniques called ""abstract interpretation"" currently being used in various industrial fields: railway, aeronautics, space, automotive, etc. The purpose of this book is to present students and researchers, in a single book, with the wealth of experience of people who are intrinsically involved in the realization and evaluation of software-based safety critical systems. As the authors are people curr 410 0$aISTE 606 $aComputer software$xTesting 606 $aDebugging in computer science 606 $aComputer software$xQuality control 615 0$aComputer software$xTesting. 615 0$aDebugging in computer science. 615 0$aComputer software$xQuality control. 676 $a005.1/4 701 $aBoulanger$b Jean-Louis$0847395 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910821368103321 996 $aStatic analysis of software$93983000 997 $aUNINA