|
|
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the 11th International Conference on Integrated Formal Methods, IFM 2014, held in Bertinoro, Italy, in September 2014. The 21 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 43 submissions. The papers have been organized in the following topical sections: tool integration; model verification; program development; security analysis; analysis and transformation; and concurrency and control. Full Product DetailsAuthor: Elvira Albert , Emil SekerinskiPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 2014 ed. Volume: 8739 Dimensions: Width: 15.50cm , Height: 2.10cm , Length: 23.50cm Weight: 6.088kg ISBN: 9783319101804ISBN 10: 3319101803 Pages: 390 Publication Date: 15 September 2014 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsShape and Content: A Database-Theoretic Perspective on the Analysis of Data Structures.- How to Break the Bank: Semantics of Capability Policies.- Model-Checking Circus State-Rich Specifications.- An Interactive Verification Tool Meets an IDE.- An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems.- Modeling UML Template Classes with FoCaLiZe.- Integrating Event-B Modelling and Discrete-Event Simulation to Analyse Resilience of Data Stores in the Cloud.- Applying an Integrated Modelling Process to Run-time Management of Many-Core Systems.- Verifying Behavioral UML Systems via CEGAR.- Formal Refinement in SysML.- Verifying Modal Workflow Specifications Using Constraint Solving.-Proofs and Refutations in Invariant-Based Programming.- Automated Theorem Prover Assisted Program Calculations.- Managing LTL Properties in Event-B Refinement.- Formal Security Analysis of the MaCAN Protocol.- A Probabilistic Framework for Security Scenarios with Dependent Actions.- A Hybrid Analysis for Security Protocols with State.- Towards a Formal Semantics-Based Technique for Interprocedural Slicing.- Integrating Software and Hardware Verification.- Code Generation for Event-B.- Verifying Linearizability on TSO Architectures.- A Compositional Proof Method for Linearizability Applied to a Wait-Free Multiset.- A Separation Principle for Embedded System Interfacing.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||