Fr. 69.00

Verified Software: Theories, Tools, Experiments - Second International Conference, VSTTE 2008, Toronto, Canada, October 6-9, 2008, Proceedings

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

This volume contains the proceedings of the second working conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2008, held in Toronto, Canada, in October 2008. The 16 papers presented together with 4 invited talks were carefully revised and selected for inclusion in the book. This second conference formally inaugurates the Verified Software Initiative (VSI), a fifteen-year, co-operative, international project directed at the scientific challenges of large-scale software verification. The scope of the cooperative effort includes the sharing and interoperability of tools, the alignment of theory and practice, the identification of challenge problems, the construction of benchmark suites, and the execution of large-scale experiments.

List of contents

Keynote Talks (Abstracts).- Readable Formal Proofs.- From Verification to Synthesis.- Verification, Least-Fixpoint Checking, Abstraction.- Combining Tests and Proofs.- Logics.- Propositional Dynamic Logic for Recursive Procedures.- Mapped Separation Logic.- Unguessable Atoms: A Logical Foundation for Security.- Combining Domain-Specific and Foundational Logics to Verify Complete Software Systems.- Tools.- JML4: Towards an Industrial Grade IVE for Java and Next Generation Research Platform for JML.- Incremental Benchmarks for Software Verification Tools and Techniques.- Case Studies.- Verified Protection Model of the seL4 Microkernel.- Verification of the Deutsch-Schorr-Waite Marking Algorithm with Modal Logic.- Bounded Verification of Voting Software.- Methodology.- Expression Decomposition in a Rely/Guarantee Context.- A Verification Approach for System-Level Concurrent Programs.- Boogie Meets Regions: A Verification Experience Report.- Flexible Immutability with Frozen Objects.- Verisoft.- The Verisoft Approach to Systems Verification.- Formal Functional Verification of Device Drivers.- Verified Process-Context Switch for C-Programmed Kernels.- Paper from VSTTE 2005.- Where Is the Value in a Program Verifier?.

Summary

This volume contains the proceedings of the second working conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2008, held in Toronto, Canada, in October 2008. The 16 papers presented together with 4 invited talks were carefully revised and selected for inclusion in the book. This second conference formally inaugurates the Verified Software Initiative (VSI), a fifteen-year, co-operative, international project directed at the scientific challenges of large-scale software verification. The scope of the cooperative effort includes the sharing and interoperability of tools, the alignment of theory and practice, the identification of challenge problems, the construction of benchmark suites, and the execution of large-scale experiments.

Product details

Assisted by Nataraja Shankar (Editor), Natarajan Shankar (Editor), Woodcock (Editor), Woodcock (Editor), Jim Woodcock (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2008
 
EAN 9783540878728
ISBN 978-3-540-87872-8
No. of pages 263
Dimensions 155 mm x 16 mm x 238 mm
Weight 423 g
Illustrations XII, 263 p.
Series Lecture Notes in Computer Science
Programming and Software Engineering
Lecture Notes in Computer Science / Programming and Software Engineering
Lecture Notes in Computer Science
Programming and Software Engineering
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.