|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Kenji Suzuki , Teruo Higashino , Keiichi Yasumoto , Khaled El-FakihPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2008 ed. Volume: 5048 Dimensions: Width: 15.50cm , Height: 1.80cm , Length: 23.50cm Weight: 0.551kg ISBN: 9783540688549ISBN 10: 3540688544 Pages: 344 Publication Date: 27 May 2008 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsInvited Talk.- Model Generation for Horn Logic with Stratified Negation.- Abstraction.- Counterexample Guided Spotlight Abstraction Refinement.- An Experimental Evaluation of Probabilistic Simulation.- An SMT Approach to Bounded Reachability Analysis of Model Programs.- Verification.- Parameterized Tree Systems.- Adapting Petri Nets Reductions to Promela Specifications.- Verification of a Hierarchical Generic Mutual Exclusion Algorithm.- Specification Framework I.- Distributed Semantics and Implementation for Systems with Interaction and Priority.- Checking Correctness of Transactional Behaviors.- Specifying and Verifying Web Transactions.- Application.- Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri Nets.- Program Repair Suggestions from Graphical State-Transition Specifications.- Verifying Erlang Telecommunication Systems with the Process Algebra ?CRL.- Specification Framework II.- NQSL - Formal Language and Tool Support for Network Quality-of-Service Requirements.- Timed Mobile Ambients for Network Protocols.- A Specification Framework for Earth-Friendly Logistics.- Theory.- A Hierarchy of Equivalences for Probabilistic Processes.- Multiset Bisimulations as a Common Framework for Ordinary and Probabilistic Bisimulations.- Reliability of Networked Systems.- Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning.- Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol.- Protocol Modeling with Model Program Composition.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |