Cargando…

Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Margaria, Tiziana (Editor ), Steffen, Bernhard (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Theoretical Computer Science and General Issues, 6415
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • New Challenges in the Development of Critical Embedded Systems - An "aeromotive" Perspective
  • New Challenges in the Development of Critical Embedded Systems-An "aeromotive" Perspective
  • Certification of Embedded Software - Impact of ISO DIS 26262 in the Automotive Domain
  • Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns
  • Seamless Model-Driven Development Put into Practice
  • Timely Time Estimates
  • Compiler-Support for Robust Multi-core Computing
  • Formal Languages and Methods for Designing and Verifying Complex Embedded Systems
  • Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems
  • Analyzing the Security in the GSM Radio Network Using Attack Jungles
  • Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method
  • Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset
  • Contract-Based Slicing
  • Worst-Case Traversal Time (WCTT)
  • Special Track on Worst Case Traversal Time (WCTT)
  • The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus
  • NC-Maude: A Rewriting Tool to Play with Network Calculus
  • DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems
  • A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling
  • Flow Control with (Min,+) Algebra
  • An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks
  • Towards Resource-Optimal Routing Plans for Real-Time Traffic
  • Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet
  • Analyzing End-to-End Functional Delays on an IMA Platform
  • Tools in Scientific Workflow Composition
  • Tools in Scientific Workflow Composition
  • Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction
  • Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL
  • Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy
  • Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins
  • Workflow Construction for Service-Oriented Knowledge Discovery
  • Workflow Composition and Enactment Using jORCA
  • A Linked Data Approach to Sharing Workflows and Workflow Results
  • Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things
  • Towards More Adaptive Voice Applications
  • Telco Service Delivery Platforms in the Last Decade - A R&D Perspective
  • Ontology-Driven Pervasive Service Composition for Everyday Life
  • Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects
  • Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution
  • Relay Placement Problem in Smart Grid Deployment
  • Web Science
  • Towards a Research Agenda for Enterprise Crowdsourcing
  • Analyzing Collaboration in Software Development Processes through Social Networks
  • A Web-Based Framework for Collaborative Innovation
  • A Distributed Dynamics for WebGraph Decontamination
  • Increasing Users' Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model
  • Understanding IT Organizations
  • On the 2-Categorical View of Proofs
  • Model Transformation and Analysis for Industrial Scale Validation
  • WOMM: A Weak Operational Memory Model
  • A Memory Model for Static Analysis of C Programs
  • Analysing Message Sequence Graph Specifications
  • Optimize Context-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination
  • A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL
  • SPARDL: A Requirement Modeling Language for Periodic Control System
  • AutoPA: Automatic Prototyping from Requirements
  • Systematic Model-Based Safety Assessment Via Probabilistic Model Checking
  • Learning Techniques for Software Verification and Validation
  • Learning Techniques for Software Verification and Validation - Special Track at ISoLA 2010
  • Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning
  • Inferring Compact Models of Communication Protocol Entities
  • Inference and Abstraction of the Biometric Passport
  • From ZULU to RERS.