You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This Festschrift volume, published in honor of Willem-Paul de Roever, contains 19 detailed papers written by the friends and colleagues of the honoree, all eminent scientists in their own right. These are preceded by a detailed bibliography and rounded off, at the end of the book, with a gallery of photographs. The theme under which the papers have been collected is Concurrency, Compositionality, and Correctness, reflecting the focus of Willem-Paul de Roever's research career. Topics addressed include model checking, computer science and state machines, ontology and mereology of domains, game theory, compiler correctness, fair scheduling and encryption algorithms.
This book presents revised tutorial lectures given by invited speakers at the First International Symposium on Formal Methods for Components and Objects, FMCO 2002, held in Leiden, The Netherlands, in November 2002. The 21 revised lectures by leading researchers present a comprehensive account of the potential of formal methods applied to complex software systems such as components and object systems. The book makes a unique contribution to bridging the gap between theory and practice in software engineering.
This book constitutes the thoroughly refereed joint postproceedings of the satellite activities held at the 7th International Conference on the Unified Modeling Language, UML 2004, in Lisbon, Portugal in October 2004 complementing the main conference track. The book presents reports on the 10 workshops held at UML and covers a broad range of topics around systems modelling; these reports are compiled by the respective workshop organizers. Furthermore 12 revised reviewed papers from the industry track are included as well as 11 short papers corresponding to selected poster/demo presentations and a summary on the UML tools exhibition.
The SPIN workshop series brings together researchers and practitioners int- ested in explicit state model checking technology as it is applied to the veri?- tion of software systems. Since 1995, when the SPIN workshop series was instigated, SPIN workshops have been held on an annual basis at Montr ́ eal (1995), New Brunswick (1996), Enschede (1997), Paris (1998), Trento (1999), Toulouse (1999), Stanford (2000), andToronto(2001). Whilethe?rstSPINworkshopwasastand-aloneevent,later workshopshavebeenorganizedasmoreorlesscloselya?liatedeventswithlarger conferences, in particular with CAV (1996), TACAS (1997), FORTE/PSTV (1998), FLOC (1999), World Congress on Formal Methods (1999), FMOODS (2000),...
This book constitutes the refereed proceedings of the 8th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS 2006, held in Bologna, Italy, June 2006. The book presents 16 revised full papers together with an invited paper and abstracts of 2 invited talks. Coverage includes component- and model-based design, service-oriented computing, software quality, modeling languages implementation, formal specification, verification, validation, testing, and service-oriented systems.
This volume contains the proceedings of the Fifth Conference on Computer-Aided Verfication, held in Crete, Greece, in June/July 1993. The objective of the CAV conferences is to bring together researchers and practitioners interested in the development anduse of methods, tools, and theories for the computer-aided verification of concurrent systems. The conferences provide an opportunity for comparing various verfication methods and tools that can be used to assist the applications designer. Emphasis is placed on new research results and the application of existing methods to real verification problems. The volume contains abstracts of three invited lectures and full versions of 37 contributed papers selected from 84 submissions.The contributions are grouped into sections on hardware verification with BDDs, methods and tools, theorem proving, analysis of real-time systems, process algebras and calculi, partial orders, and exploiting symmetry.
As a consequence of the wide distribution of software and software infrastructure, information security and safety depend on the quality and excellent understanding of its functioning. Only if this functionality is guaranteed as safe, customer and information are protected against adversarial attacks and malfunction. A vast proportion of information exchange is dominated by computer systems. Due to the fact that technical systems are more or less interfaced with software systems, most information exchange is closely related to software and computer systems. Information safety and security of software systems depend on the quality and excellent understanding of its functioning. The last few y...