libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

margaria tiziana (curatore); steffen bernhard (curatore) - leveraging applications of formal methods, verification, and validation

Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I

;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
108,98 €
NICEPRICE
103,53 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 10/2010
Edizione: 2010





Sommario

New Challenges in the Development of Critical Embedded Systems – An “aeromotive” Perspective.- New Challenges in the Development of Critical Embedded Systems—An “aeromotive” Perspective.- Certification of Embedded Software – Impact of ISO DIS 26262 in the Automotive Domain.- Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns.- Seamless Model-Driven Development Put into Practice.- Timely Time Estimates.- Compiler-Support for Robust Multi-core Computing.- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems.- Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems.- Analyzing the Security in the GSM Radio Network Using Attack Jungles.- Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method.- Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset.- Contract-Based Slicing.- Worst-Case Traversal Time (WCTT).- Special Track on Worst Case Traversal Time (WCTT).- The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus.- NC-Maude: A Rewriting Tool to Play with Network Calculus.- DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems.- A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling.- Flow Control with (Min,+) Algebra.- An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks.- Towards Resource-Optimal Routing Plans for Real-Time Traffic.- Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet.- Analyzing End-to-End Functional Delays on an IMA Platform.- Tools in Scientific Workflow Composition.- Tools in Scientific Workflow Composition.- Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction.- Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL.- Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy.- Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins.- Workflow Construction for Service-Oriented Knowledge Discovery.- Workflow Composition and Enactment Using jORCA.- A Linked Data Approach to Sharing Workflows and Workflow Results.- Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things.- Towards More Adaptive Voice Applications.- Telco Service Delivery Platforms in the Last Decade - A R&D Perspective.- Ontology-Driven Pervasive Service Composition for Everyday Life.- Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects.- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution.- Relay Placement Problem in Smart Grid Deployment.- Web Science.- Towards a Research Agenda for Enterprise Crowdsourcing.- Analyzing Collaboration in Software Development Processes through Social Networks.- A Web-Based Framework for Collaborative Innovation.- A Distributed Dynamics for WebGraph Decontamination.- Increasing Users’ Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model.- Understanding IT Organizations.- On the 2-Categorical View of Proofs.- Model Transformation and Analysis for Industrial Scale Validation.- WOMM: A Weak Operational Memory Model.- A Memory Model for Static Analysis of C Programs.- Analysing Message Sequence Graph Specifications.- Optimize Context-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination.- A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL.- SPARDL: A Requirement Modeling Language for Periodic Control System.- AutoPA: Automatic Prototyping from Requirements.- Systematic Model-Based Safety Assessment Via Probabilistic Model Checking.- Learning Techniques for Software Verification and Validation.- Learning Techniques for Software Verification and Validation – Special Track at ISoLA 2010.- Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning.- Inferring Compact Models of Communication Protocol Entities.- Inference and Abstraction of the Biometric Passport.- From ZULU to RERS.










Altre Informazioni

ISBN:

9783642165573

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 0 x 0 mm Ø 1082 gr
Formato: Brossura
Illustration Notes:XX, 708 p. 220 illus.
Pagine Arabe: 708
Pagine Romane: xx


Dicono di noi