Vai al contenuto principale della pagina
Titolo: | Leveraging Applications of Formal Methods, Verification, and Validation [[electronic resource] ] : 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I / / edited by Tiziana Margaria, Bernhard Steffen |
Pubblicazione: | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Edizione: | 1st ed. 2010. |
Descrizione fisica: | 1 online resource (XX, 708 p. 220 illus.) |
Disciplina: | 004.6 |
Soggetto topico: | Computer networks |
Computer science | |
Software engineering | |
Compilers (Computer programs) | |
Application software | |
Data mining | |
Computer Communication Networks | |
Computer Science Logic and Foundations of Programming | |
Software Engineering | |
Compilers and Interpreters | |
Computer and Information Systems Applications | |
Data Mining and Knowledge Discovery | |
Persona (resp. second.): | MargariaTiziana |
SteffenBernhard | |
Note generali: | Bibliographic Level Mode of Issuance: Monograph |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | New Challenges in the Development of Critical Embedded Systems – An “aeromotive” Perspective -- New Challenges in the Development of Critical Embedded Systems—An “aeromotive” Perspective -- Certification of Embedded Software – Impact of ISO DIS 26262 in the Automotive Domain -- Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns -- Seamless Model-Driven Development Put into Practice -- Timely Time Estimates -- Compiler-Support for Robust Multi-core Computing -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Analyzing the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method -- Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset -- Contract-Based Slicing -- Worst-Case Traversal Time (WCTT) -- Special Track on Worst Case Traversal Time (WCTT) -- The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus -- NC-Maude: A Rewriting Tool to Play with Network Calculus -- DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems -- A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling -- Flow Control with (Min,+) Algebra -- An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks -- Towards Resource-Optimal Routing Plans for Real-Time Traffic -- Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet -- Analyzing End-to-End Functional Delays on an IMA Platform -- Tools in Scientific Workflow Composition -- Tools in Scientific Workflow Composition -- Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction -- Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL -- Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy -- Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins -- Workflow Construction for Service-Oriented Knowledge Discovery -- Workflow Composition and Enactment Using jORCA -- A Linked Data Approach to Sharing Workflows and Workflow Results -- Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things -- Towards More Adaptive Voice Applications -- Telco Service Delivery Platforms in the Last Decade - A R&D Perspective -- Ontology-Driven Pervasive Service Composition for Everyday Life -- Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects -- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution -- Relay Placement Problem in Smart Grid Deployment -- Web Science -- Towards a Research Agenda for Enterprise Crowdsourcing -- Analyzing Collaboration in Software Development Processes through Social Networks -- A Web-Based Framework for Collaborative Innovation -- A Distributed Dynamics for WebGraph Decontamination -- Increasing Users’ Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model -- Understanding IT Organizations -- On the 2-Categorical View of Proofs -- Model Transformation and Analysis for Industrial Scale Validation -- WOMM: A Weak Operational Memory Model -- A Memory Model for Static Analysis of C Programs -- Analysing Message Sequence Graph Specifications -- Optimize Context-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination -- A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL -- SPARDL: A Requirement Modeling Language for Periodic Control System -- AutoPA: Automatic Prototyping from Requirements -- Systematic Model-Based Safety Assessment Via Probabilistic Model Checking -- Learning Techniques for Software Verification and Validation -- Learning Techniques for Software Verification and Validation – Special Track at ISoLA 2010 -- Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning -- Inferring Compact Models of Communication Protocol Entities -- Inference and Abstraction of the Biometric Passport -- From ZULU to RERS. |
Titolo autorizzato: | Leveraging applications of formal methods, verification and validation |
ISBN: | 3-642-16558-3 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 996466260103316 |
Lo trovi qui: | Univ. di Salerno |
Opac: | Controlla la disponibilità qui |