You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 4th Asian Symposium on Programming Languages and Systems, APLAS 2006, held in Sydney, Australia in November 2006. The 22 revised full papers presented together with 2 invited talks and 1 tutorial examine foundational and practical issues in programming languages and systems.
This book constitutes the thoroughly refereed postproceedings of the First International Colloquium on Theoretical Aspects of Computing, ICTAC 2004. The 34 revised full papers presented together with 4 invited contributions were carefully selected from 111 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on concurrent and distributed systems, model integration and theory unification, program reasoning and testing, verification, theories of programming and programming languages, real-time and co-design, and automata theory and logics.
This is the second time that of ESOP has formed part of the ETAPS cluster of conferences, workshops, working group meetings and other associated activities. One of the results of colocatingso many conferences is a reduction in the number of possibilities to submit a paper to a European conference and the increased competition between conferences that occurs when boundaries between indiv- ual conferences have not yet become well established. This may have been the reason for the fact that only 44 submission were received this year. On the other hand we feel that the average quality of submissions has gone up, and thus the program committee was able to select 18 good papers, only one less than...
Software systems play a central role in modern society, and their correctness is often crucially important. Formal specification and verification are promising approaches for ensuring correctness more rigorously than just by testing. This work presents an approach for deductively verifying design-by-contract specifications of object-oriented programs. The approach is based on dynamic logic, and addresses the challenges of modularity and automation using dynamic frames and predicate abstraction.
This book constitutes the thoroughly refereed postconference proceedings of the 5th International Andrei Ershov Memorial Conference, PSI 2003, held in Akademgorodok, Novosibirsk, Russia in July 2003. The 55 revised full papers presented were carefully reviewed and selected from 110 submissions during two rounds of evaluation and improvement. The papers are organized in topical sections on programming, software engineering, software education, program synthesis and transformation, graphical interfaces, partial evaluation and supercompilation, verification, logic and types, concurrent and distributed systems, reactive systems, program specification, verification and model checking, constraint programming, documentation and testing, databases, and natural language processing.
Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4–6, 2003. This volume is the collection of the papers that were presented at ISSS 2003. The proceedings of ISSS 2002 was published as LNCS 2609. Although the security and reliability of software systems for networked c- puter systems are major concerns of current society, the technology for software securitystillneedstobedevelopedinmanydirections.SimilartoISSS2002,ISSS 2003 aimed to provide a forum for research discussions and exchanges among world-leading scientists in the ?e...
This book constitutes the refereed proceedings of the 4th International Conference on Tools and Methods for Program Analysis, TMPA 2017, Moscow, Russia, March 3-4, 2017. The 12 revised full papers and 5 revised short papers presented together with three abstracts of keynote talks were carefully reviewed and selected from 51 submissions. The papers deal with topics such as software test automation, static program analysis, verification, dynamic methods of program analysis, testing and analysis of parallel and distributed systems, testing and analysis of high-load and high-availability systems, analysis and verification of hardware and software systems, methods of building quality software, tools for software analysis, testing and verification.
This book constitutes the refereed proceedings of the 20th international Conference on Foundations of Software Technology and Theoretical Computer Science, FST TCS 2000, held in New Delhi, India in December 2000. The 36 revised full papers presented were carefully reviewed and selected from a total of 141 submissions; also included are six invited papers. The volume provides broad coverage of the logical and mathematical foundations of computer science and spans the whole range of theoretical computer science.
This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively – so bringing precise meaning to the intuition that certain information leaks are small enough to be tolerated – and how systems can be constructed that achieve rigorous, quantitative information-flow guarantees in those terms. It addresses the fundamental challenge that functional and practical requirements frequently conflict with the goal of preserving confidentiality, making perfect security unattainable. Topics include: a systematic presentation of how unwanted information flow, i.e., "leaks", can be quantified in operationally significant wa...
Until quite recently, the correctness and security of software systems was a largely theoretical problem relevant only for a small group of computer specialists. Today it is a fundamental problem for society at large, with security breaches in banking software, malware attacks and bugs in programs affecting millions of people and making the headlines almost daily. The computer science community is developing verification and synthesis tools which will mechanize ever more tasks in the design of secure programs. This book presents the papers delivered at the NATO Advanced Study Institute (ASI) Summer School Marktoberdorf 2013 – Software Systems Safety. The participants represented research g...