Cargando…

Towards verified systems /

As the complexity of embedded computer-controlled systems increases, the present industrial practice for their development gives cause for concern, especially for safety-critical applications where human lives are at stake. The use of software in such systems has increased enormously in the last dec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bowen, J. P. (Jonathan Peter), 1956-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; New York : Elsevier, 1994.
Colección:Real-time safety critical systems ; 2.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn881847822
003 OCoLC
005 20231120111632.0
006 m o d
007 cr cnu---unuuu
008 140627s1994 ne a ob 000 0 eng d
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d IDEBK  |d N$T  |d YDXCP  |d OCLCQ  |d EBLCP  |d E7B  |d DEBSZ  |d MERUC  |d OCLCQ  |d DEBBG  |d OCLCQ  |d OCLCO  |d OCLCA  |d UKAHL  |d OCLCQ  |d LUN  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 895436633 
020 |a 9781483291529  |q (electronic bk.) 
020 |a 1483291529  |q (electronic bk.) 
020 |z 0444899014 
020 |z 9780444899019 
035 |a (OCoLC)881847822  |z (OCoLC)895436633 
050 4 |a QA76.9.E94  |b T68 1994eb 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004/.33  |2 22 
084 |a 54.99  |2 bcl 
084 |a ST 233  |2 rvk 
084 |a ST 345  |2 rvk 
245 0 0 |a Towards verified systems /  |c edited by Jonathan Bowen. 
264 1 |a Amsterdam ;  |a New York :  |b Elsevier,  |c 1994. 
300 |a 1 online resource (xxvi, 296 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Real-time safety critical systems ;  |v vol. 2 
504 |a Includes bibliographical references (pages 269-296). 
520 |a As the complexity of embedded computer-controlled systems increases, the present industrial practice for their development gives cause for concern, especially for safety-critical applications where human lives are at stake. The use of software in such systems has increased enormously in the last decade. Formal methods, based on firm mathematical foundations, provide one means to help with reducing the risk of introducing errors during specification and development. There is currently much interest in both academic and industrial circles concerning the issues involved, but the techniques still need further investigation and promulgation to make their widespread use a reality. This book presents results of research into techniques to aid the formal verification of mixed hardware/software systems. Aspects of system specification and verification from requirements down to the underlying hardware are addressed, with particular regard to real-time issues. The work presented is largely based around the Occam programming language and Transputer microprocessor paradigm. The HOL theorem prover, based on higher order logic, has mainly been used in the application of machine-checked proofs. The book describes research work undertaken on the collaborative UK DTI/SERC-funded Information Engineering Dictorate Safemos project. The partners were Inmos Ltd., Cambridge SRI, the Oxford University Computing Laboratory and the University of Cambridge Computer Laboratory, who investigated the problems of formally verifying embedded systems. The most important results of the project are presented in the form of a series of interrelated chapters by project members and associated personnel. In addition, overviews of two other ventures with similar objectives are included as appendices. The material in this book is intended for computing science researchers and advanced industrial practitioners interested in the application of formal methods to real-time safety-critical systems at all levels of abstraction from requirements to hardware. In addition, material of a more general nature is presented, which may be of interest to managers in charge of projects applying formal methods, especially for safety-critical-systems, and others who are considering their use. 
588 0 |a Print version record. 
505 0 |a Front Cover; Towards Verified Systems; Copyright Page; Table of Contents; List of Figures; List of Tables; Dedication; Foreword; Preface; Contact Addresses; Part I: Introduction; Chapter 1. Safety-Critical Systems and Formal Methods; 1.1 A Brief Historical Perspective; 1.2 Safety-critical Computer Systems; 1.3 Industrial-scale Examples of Use; 1.4 Areas of Application of Formal Methods; 1.5 Safety Standards; 1.6 Discussion; Acknowledgements; Chapter 2. Overview of the Project; 2.1 The SAFEMOS Project; 2.2 System Modelling; 2.3 Software Development and Compilation. 
505 8 |a 2.4 Hardware Design and Compilation2.5 Other SAFEMOS Project Work; 2.6 Related Work; 2.7 Conclusion; Part II: Tools and Models; Chapter 3. The HOL Logic and System; 3.1 Introduction; 3.2 The HOL Logic; 3.3 The HOL System; Chapter 4. Timed Transition Systems; 4.1 Introduction to TTSs and HOL; 4.2 Example: A Traffic Light Controller; 4.3 A Real-Time Temporal Logic; 4.4 Timed Transition Systems; 4.5 Timed Transition Diagrams; 4.6 Verification; 4.7 Discussion; Part III: Software; Chapter 5. State Transition Assertions:A Case Study; 5.1 Introduction; 5.2 An Example: Mult. 
505 8 |a 5.3 A More Detailed Specification of Mult5.4 Determining a Machine from a Program; 5.5 State Transition Assertions; 5.6 Formal Specification of Mult; 5.7 Correctness of MultProg; 5.8 Generating Atomic STAs; 5.9 Laws for Combining STAs; 5.10 Conclusions; Chapter 6. A Real-time ProgrammingLanguage; 6.1 The SAFE Programming Language; 6.2 Interval Model; 6.3 Interval Semantics; 6.4 SAFE Semantics; 6.5 Laws; 6.6 Conclusion; Chapter 7. Program Compilation; 7.1 Machine Language Syntax; 7.2 Machine Language Semantics; 7.3 Compiler Specification; 7.4 Correctness of Compilation. 
505 8 |a 7.5 Proof of Correctness of Compilation7.6 Conclusion; Part IV: Hardware; Chapter 8. A Framework for MicroprocessorDesign; 8.1 Introduction; 8.2 Machine Specification Framework; 8.3 Microcoded Machine Example; 8.4 Incremental Model of Control Memory; 8.5 Summary; Chapter 9. Designing a Processor; 9.1 Instruction Set and Machine Architecture; 9.2 Top Level Specification; 9.3 Microcoded Implementation; 9.4 Low-level Implementation; 9.5 Conclusions; Chapter 10. Hardware Compilation; 10.1 Introduction; 10.2 A Language of Communicating Processes; 10.3 Normal Form Implementation. 
505 8 |a 10.4 Reduction to Normal Form10.5 Example Proof; 10.6 Rapid Prototype Compiler; 10.7 Mapping Normal Form into Hardware; 10.8 Conclusions; Part V: Technology Transfer; Chapter 11. Transfer into Industrial Design; 11.1 Historical Background; 11.2 Benefits from Formal Methods; 11.3 Technology Transfer Problems; 11.4 Requirements for Transfer of Formal Methods; 11.5 Methods for Transferring Formal Methods; 11.6 Technology Transfer from the SAFEMOS Project; Appendices: Related Work; Appendix A: System Verification andthe CLI Stack; A.1 Introduction; A.2 Our Philosophy of Systems Verification. 
650 0 |a Embedded computer systems  |x Evaluation. 
650 0 |a Real-time data processing. 
650 6 |a Syst�emes enfouis (Informatique)  |0 (CaQQLa)201-0171574  |x �Evaluation.  |0 (CaQQLa)201-0379188 
650 6 |a Temps r�eel (Informatique)  |0 (CaQQLa)201-0017753 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Embedded computer systems  |x Evaluation.  |2 fast  |0 (OCoLC)fst00908302 
650 7 |a Real-time data processing.  |2 fast  |0 (OCoLC)fst01091219 
650 7 |a Echtzeitsystem  |2 gnd  |0 (DE-588)4131397-5 
650 7 |a Technische Sicherheit  |2 gnd  |0 (DE-588)4059233-9 
650 7 |a Verifikation  |2 gnd  |0 (DE-588)4135577-5 
700 1 |a Bowen, J. P.  |q (Jonathan Peter),  |d 1956- 
776 0 8 |i Print version:  |t Towards verified systems  |z 0444899014  |w (DLC) 94030630  |w (OCoLC)30914198 
830 0 |a Real-time safety critical systems ;  |v 2. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780444899019  |z Texto completo 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/bookseries/15725960/2  |z Texto completo