|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-27919-5 |
003 |
DE-He213 |
005 |
20220117160150.0 |
007 |
cr nn 008mamaa |
008 |
120410s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642279195
|9 978-3-642-27919-5
|
024 |
7 |
|
|a 10.1007/978-3-642-27919-5
|2 doi
|
050 |
|
4 |
|a QA76.758
|
072 |
|
7 |
|a UMZ
|2 bicssc
|
072 |
|
7 |
|a COM051230
|2 bisacsh
|
072 |
|
7 |
|a UMZ
|2 thema
|
082 |
0 |
4 |
|a 005.1
|2 23
|
100 |
1 |
|
|a Kourie, Derrick G.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
4 |
|a The Correctness-by-Construction Approach to Programming
|h [electronic resource] /
|c by Derrick G. Kourie, Bruce W. Watson.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XIV, 266 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction -- Background -- Simple Examples -- Intermediary Examples -- Procedures and Recursion -- Case Study: Lattice Cover Graph Construction -- Case Study 2: Classifying MADFA Construction Algorithms.
|
520 |
|
|
|a The focus of this book is on bridging the gap between two extreme methods for developing software. On the one hand, there are texts and approaches that are so formal that they scare off all but the most dedicated theoretical computer scientists. On the other, there are some who believe that any measure of formality is a waste of time, resulting in software that is developed by following gut feelings and intuitions. Kourie and Watson advocate an approach known as "correctness-by-construction," a technique to derive algorithms that relies on formal theory, but that requires such theory to be deployed in a very systematic and pragmatic way. First they provide the key theoretical background (like first-order predicate logic or refinement laws) that is needed to understand and apply the method. They then detail a series of graded examples ranging from binary search to lattice cover graph construction and finite automata minimization in order to show how it can be applied to increasingly complex algorithmic problems. The principal purpose of this book is to change the way software developers approach their task at programming-in-the-small level, with a view to improving code quality. Thus it coheres with both the IEEE's Guide to the Software Engineering Body of Knowledge (SWEBOK) recommendations, which identifies themes covered in this book as part of the software engineer's arsenal of tools and methods, and with the goals of the Software Engineering Method and Theory (SEMAT) initiative, which aims to "refound software engineering based on a solid theory.".
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Machine theory.
|
650 |
1 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Computer Science Logic and Foundations of Programming.
|
650 |
2 |
4 |
|a Formal Languages and Automata Theory.
|
700 |
1 |
|
|a Watson, Bruce W.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642448546
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642279201
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642279188
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-27919-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|