buchspektrum Internet-Buchhandlung

Neuerscheinungen 2014

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

Elvira Albert, Emil Sekerinski (Beteiligte)

Integrated Formal Methods


11th International Conference, IFM 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings
Herausgegeben von Albert, Elvira; Sekerinski, Emil
2014. 2014. xii, 390 S. 125 SW-Abb. 235 mm
Verlag/Jahr: SPRINGER, BERLIN; SPRINGER INTERNATIONAL PUBLISHING 2014
ISBN: 3-319-10180-3 (3319101803)
Neue ISBN: 978-3-319-10180-4 (9783319101804)

Preis und Lieferzeit: Bitte klicken


This book constitutes the refereed proceedings of the 11th International Conference on Integrated Formal Methods, IFM 2014, held in Bertinoro, Italy, in September 2014. The 21 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 43 submissions. The papers have been organized in the following topical sections: tool integration; model verification; program development; security analysis; analysis and transformation; and concurrency and control.
Shape and Content: A Database-Theoretic Perspective on the Analysis of Data Structures.- How to Break the Bank: Semantics of Capability Policies.- Model-Checking Circus State-Rich Specifications.- An Interactive Verification Tool Meets an IDE.- An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems.- Modeling UML Template Classes with FoCaLiZe.- Integrating Event-B Modelling and Discrete-Event Simulation to Analyse Resilience of Data Stores in the Cloud.- Applying an Integrated Modelling Process to Run-time Management of Many-Core Systems.- Verifying Behavioral UML Systems via CEGAR.- Formal Refinement in SysML.- Verifying Modal Workflow Specifications Using Constraint Solving.-Proofs and Refutations in Invariant-Based Programming.- Automated Theorem Prover Assisted Program Calculations.- Managing LTL Properties in Event-B Refinement.- Formal Security Analysis of the MaCAN Protocol.- A Probabilistic Framework for Security Scenarios with Dependent Actions.- A Hybrid Analysis for Security Protocols with State.- Towards a Formal Semantics-Based Technique for Interprocedural Slicing.- Integrating Software and Hardware Verification.- Code Generation for Event-B.- Verifying Linearizability on TSO Architectures.- A Compositional Proof Method for Linearizability Applied to a Wait-Free Multiset.- A Separation Principle for Embedded System Interfacing.