Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I /

Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I / [electronic resource] : edited by Tiziana Margaria, Bernhard Steffen. - 1st ed. 2010. - XX, 708 p. 220 illus. online resource. - Theoretical Computer Science and General Issues, 6415 2512-2029 ; . - Theoretical Computer Science and General Issues, 6415 .

New Challenges in the Development of Critical Embedded Systems – An “aeromotive” Perspective -- New Challenges in the Development of Critical Embedded Systems—An “aeromotive” Perspective -- Certification of Embedded Software – Impact of ISO DIS 26262 in the Automotive Domain -- Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns -- Seamless Model-Driven Development Put into Practice -- Timely Time Estimates -- Compiler-Support for Robust Multi-core Computing -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Analyzing the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method -- Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset -- Contract-Based Slicing -- Worst-Case Traversal Time (WCTT) -- Special Track on Worst Case Traversal Time (WCTT) -- The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus -- NC-Maude: A Rewriting Tool to Play with Network Calculus -- DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems -- A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling -- Flow Control with (Min,+) Algebra -- An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks -- Towards Resource-Optimal Routing Plans for Real-Time Traffic -- Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet -- Analyzing End-to-End Functional Delays on an IMA Platform -- Tools in Scientific Workflow Composition -- Toolsin Scientific Workflow Composition -- Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction -- Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL -- Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy -- Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins -- Workflow Construction for Service-Oriented Knowledge Discovery -- Workflow Composition and Enactment Using jORCA -- A Linked Data Approach to Sharing Workflows and Workflow Results -- Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things -- Towards More Adaptive Voice Applications -- Telco Service Delivery Platforms in the Last Decade - A R&D Perspective -- Ontology-Driven Pervasive Service Composition for Everyday Life -- Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects -- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution -- Relay Placement Problem in Smart Grid Deployment -- Web Science -- Towards a Research Agenda for Enterprise Crowdsourcing -- Analyzing Collaboration in Software Development Processes through Social Networks -- A Web-Based Framework for Collaborative Innovation -- A Distributed Dynamics for WebGraph Decontamination -- Increasing Users’ Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model -- Understanding IT Organizations -- On the 2-Categorical View of Proofs -- Model Transformation and Analysis for Industrial Scale Validation -- WOMM: A Weak Operational Memory Model -- A Memory Model for Static Analysis of C Programs -- Analysing Message Sequence Graph Specifications -- OptimizeContext-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination -- A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL -- SPARDL: A Requirement Modeling Language for Periodic Control System -- AutoPA: Automatic Prototyping from Requirements -- Systematic Model-Based Safety Assessment Via Probabilistic Model Checking -- Learning Techniques for Software Verification and Validation -- Learning Techniques for Software Verification and Validation – Special Track at ISoLA 2010 -- Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning -- Inferring Compact Models of Communication Protocol Entities -- Inference and Abstraction of the Biometric Passport -- From ZULU to RERS.

9783642165580

10.1007/978-3-642-16558-0 doi


Computer networks .
Computer science.
Software engineering.
Compilers (Computer programs).
Application software.
Data mining.
Computer Communication Networks.
Computer Science Logic and Foundations of Programming.
Software Engineering.
Compilers and Interpreters.
Computer and Information Systems Applications.
Data Mining and Knowledge Discovery.

TK5105.5-5105.9

004.6
© 2024 IIIT-Delhi, library@iiitd.ac.in