//]]>

Leveraging Applications of Formal Methods, Verification, and Validation (Record no. 13289)

000 -LEADER
fixed length control field 07947nam a22005535i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310144054.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101102s2010 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642165580
978-3-642-16558-0
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.L63
Classification number QA76.5913
Classification number QA76.63
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.1015113
Edition number 23
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
912 ## -
-- ZDB-2-SCS
-- ZDB-2-LNC
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Margaria, Tiziana.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Leveraging Applications of Formal Methods, Verification, and Validation
Medium [electronic resource] :
Remainder of title 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I /
Statement of responsibility, etc edited by Tiziana Margaria, Bernhard Steffen.
300 ## - PHYSICAL DESCRIPTION
Extent XX, 708p. 220 illus.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 6415
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note New Challenges in the Development of Critical Embedded Systems – An “aeromotive” Perspective -- New Challenges in the Development of Critical Embedded Systems—An “aeromotive” Perspective -- Certification of Embedded Software – Impact of ISO DIS 26262 in the Automotive Domain -- Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns -- Seamless Model-Driven Development Put into Practice -- Timely Time Estimates -- Compiler-Support for Robust Multi-core Computing -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Analyzing the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method -- Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset -- Contract-Based Slicing -- Worst-Case Traversal Time (WCTT) -- Special Track on Worst Case Traversal Time (WCTT) -- The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus -- NC-Maude: A Rewriting Tool to Play with Network Calculus -- DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems -- A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling -- Flow Control with (Min,+) Algebra -- An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks -- Towards Resource-Optimal Routing Plans for Real-Time Traffic -- Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet -- Analyzing End-to-End Functional Delays on an IMA Platform -- Tools in Scientific Workflow Composition -- Tools in Scientific Workflow Composition -- Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction -- Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL -- Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy -- Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins -- Workflow Construction for Service-Oriented Knowledge Discovery -- Workflow Composition and Enactment Using jORCA -- A Linked Data Approach to Sharing Workflows and Workflow Results -- Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things -- Towards More Adaptive Voice Applications -- Telco Service Delivery Platforms in the Last Decade - A R&D Perspective -- Ontology-Driven Pervasive Service Composition for Everyday Life -- Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects -- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution -- Relay Placement Problem in Smart Grid Deployment -- Web Science -- Towards a Research Agenda for Enterprise Crowdsourcing -- Analyzing Collaboration in Software Development Processes through Social Networks -- A Web-Based Framework for Collaborative Innovation -- A Distributed Dynamics for WebGraph Decontamination -- Increasing Users’ Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model -- Understanding IT Organizations -- On the 2-Categorical View of Proofs -- Model Transformation and Analysis for Industrial Scale Validation -- WOMM: A Weak Operational Memory Model -- A Memory Model for Static Analysis of C Programs -- Analysing Message Sequence Graph Specifications -- Optimize Context-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination -- A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL -- SPARDL: A Requirement Modeling Language for Periodic Control System -- AutoPA: Automatic Prototyping from Requirements -- Systematic Model-Based Safety Assessment Via Probabilistic Model Checking -- Learning Techniques for Software Verification and Validation -- Learning Techniques for Software Verification and Validation – Special Track at ISoLA 2010 -- Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning -- Inferring Compact Models of Communication Protocol Entities -- Inference and Abstraction of the Biometric Passport -- From ZULU to RERS.
520 ## - SUMMARY, ETC.
Summary, etc The two volume set LNCS 6415 and LNCS 6416 constitutes the refereed proceedings of the 4th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2010, held in Heraklion, Crete, Greece, in October 2010. The 100 revised full papers presented were carefully revised and selected from numerous submissions and discuss issues related to the adoption and use of rigorous tools and methods for the specification, analysis, verification, certification, construction, test, and maintenance of systems. The 46 papers of the first volume are organized in topical sections on new challenges in the development of critical embedded systems, formal languages and methods for designing and verifying complex embedded systems, worst-case traversal time (WCTT), tools in scientific workflow composition, emerging services and technologies for a converging telecommunications / Web world in smart environments of the internet of things, Web science, model transformation and analysis for industrial scale validation, and learning techniques for software verification and validation. The second volume presents 54 papers addressing the following topics: EternalS: mission and roadmap, formal methods in model-driven development for service-oriented and cloud computing, quantitative verification in practice, CONNECT: status and plans, certification of software-driven medical devices, modeling and formalizing industrial software for verification, validation and certification, and resource and timing analysis.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Software engineering.
Topical term or geographic name as entry element Logic design.
Topical term or geographic name as entry element Data mining.
Topical term or geographic name as entry element Information systems.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Logics and Meanings of Programs.
Topical term or geographic name as entry element Software Engineering.
Topical term or geographic name as entry element Programming Languages, Compilers, Interpreters.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Information Systems Applications (incl.Internet).
Topical term or geographic name as entry element Data Mining and Knowledge Discovery.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Steffen, Bernhard.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642165573
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-16558-0
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-03-29AUM Main Library2014-03-29 2014-03-29 E-Book   AUM Main Library005.1015113

Languages: 
English |
العربية