Towards verified systems /
As the complexity of embedded computer-controlled systems increases, the present industrial practice for their development gives cause for concern, especially for safety-critical applications where human lives are at stake. The use of software in such systems has increased enormously in the last dec...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam ; New York :
Elsevier,
1994.
|
Colección: | Real-time safety critical systems ;
2. |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | SCIDIR_ocn881847822 | ||
003 | OCoLC | ||
005 | 20231120111632.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140627s1994 ne a ob 000 0 eng d | ||
040 | |a OPELS |b eng |e rda |e pn |c OPELS |d IDEBK |d N$T |d YDXCP |d OCLCQ |d EBLCP |d E7B |d DEBSZ |d MERUC |d OCLCQ |d DEBBG |d OCLCQ |d OCLCO |d OCLCA |d UKAHL |d OCLCQ |d LUN |d OCLCQ |d OCLCO |d OCLCQ | ||
019 | |a 895436633 | ||
020 | |a 9781483291529 |q (electronic bk.) | ||
020 | |a 1483291529 |q (electronic bk.) | ||
020 | |z 0444899014 | ||
020 | |z 9780444899019 | ||
035 | |a (OCoLC)881847822 |z (OCoLC)895436633 | ||
050 | 4 | |a QA76.9.E94 |b T68 1994eb | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 0 | 4 | |a 004/.33 |2 22 |
084 | |a 54.99 |2 bcl | ||
084 | |a ST 233 |2 rvk | ||
084 | |a ST 345 |2 rvk | ||
245 | 0 | 0 | |a Towards verified systems / |c edited by Jonathan Bowen. |
264 | 1 | |a Amsterdam ; |a New York : |b Elsevier, |c 1994. | |
300 | |a 1 online resource (xxvi, 296 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Real-time safety critical systems ; |v vol. 2 | |
504 | |a Includes bibliographical references (pages 269-296). | ||
520 | |a As the complexity of embedded computer-controlled systems increases, the present industrial practice for their development gives cause for concern, especially for safety-critical applications where human lives are at stake. The use of software in such systems has increased enormously in the last decade. Formal methods, based on firm mathematical foundations, provide one means to help with reducing the risk of introducing errors during specification and development. There is currently much interest in both academic and industrial circles concerning the issues involved, but the techniques still need further investigation and promulgation to make their widespread use a reality. This book presents results of research into techniques to aid the formal verification of mixed hardware/software systems. Aspects of system specification and verification from requirements down to the underlying hardware are addressed, with particular regard to real-time issues. The work presented is largely based around the Occam programming language and Transputer microprocessor paradigm. The HOL theorem prover, based on higher order logic, has mainly been used in the application of machine-checked proofs. The book describes research work undertaken on the collaborative UK DTI/SERC-funded Information Engineering Dictorate Safemos project. The partners were Inmos Ltd., Cambridge SRI, the Oxford University Computing Laboratory and the University of Cambridge Computer Laboratory, who investigated the problems of formally verifying embedded systems. The most important results of the project are presented in the form of a series of interrelated chapters by project members and associated personnel. In addition, overviews of two other ventures with similar objectives are included as appendices. The material in this book is intended for computing science researchers and advanced industrial practitioners interested in the application of formal methods to real-time safety-critical systems at all levels of abstraction from requirements to hardware. In addition, material of a more general nature is presented, which may be of interest to managers in charge of projects applying formal methods, especially for safety-critical-systems, and others who are considering their use. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Front Cover; Towards Verified Systems; Copyright Page; Table of Contents; List of Figures; List of Tables; Dedication; Foreword; Preface; Contact Addresses; Part I: Introduction; Chapter 1. Safety-Critical Systems and Formal Methods; 1.1 A Brief Historical Perspective; 1.2 Safety-critical Computer Systems; 1.3 Industrial-scale Examples of Use; 1.4 Areas of Application of Formal Methods; 1.5 Safety Standards; 1.6 Discussion; Acknowledgements; Chapter 2. Overview of the Project; 2.1 The SAFEMOS Project; 2.2 System Modelling; 2.3 Software Development and Compilation. | |
505 | 8 | |a 2.4 Hardware Design and Compilation2.5 Other SAFEMOS Project Work; 2.6 Related Work; 2.7 Conclusion; Part II: Tools and Models; Chapter 3. The HOL Logic and System; 3.1 Introduction; 3.2 The HOL Logic; 3.3 The HOL System; Chapter 4. Timed Transition Systems; 4.1 Introduction to TTSs and HOL; 4.2 Example: A Traffic Light Controller; 4.3 A Real-Time Temporal Logic; 4.4 Timed Transition Systems; 4.5 Timed Transition Diagrams; 4.6 Verification; 4.7 Discussion; Part III: Software; Chapter 5. State Transition Assertions:A Case Study; 5.1 Introduction; 5.2 An Example: Mult. | |
505 | 8 | |a 5.3 A More Detailed Specification of Mult5.4 Determining a Machine from a Program; 5.5 State Transition Assertions; 5.6 Formal Specification of Mult; 5.7 Correctness of MultProg; 5.8 Generating Atomic STAs; 5.9 Laws for Combining STAs; 5.10 Conclusions; Chapter 6. A Real-time ProgrammingLanguage; 6.1 The SAFE Programming Language; 6.2 Interval Model; 6.3 Interval Semantics; 6.4 SAFE Semantics; 6.5 Laws; 6.6 Conclusion; Chapter 7. Program Compilation; 7.1 Machine Language Syntax; 7.2 Machine Language Semantics; 7.3 Compiler Specification; 7.4 Correctness of Compilation. | |
505 | 8 | |a 7.5 Proof of Correctness of Compilation7.6 Conclusion; Part IV: Hardware; Chapter 8. A Framework for MicroprocessorDesign; 8.1 Introduction; 8.2 Machine Specification Framework; 8.3 Microcoded Machine Example; 8.4 Incremental Model of Control Memory; 8.5 Summary; Chapter 9. Designing a Processor; 9.1 Instruction Set and Machine Architecture; 9.2 Top Level Specification; 9.3 Microcoded Implementation; 9.4 Low-level Implementation; 9.5 Conclusions; Chapter 10. Hardware Compilation; 10.1 Introduction; 10.2 A Language of Communicating Processes; 10.3 Normal Form Implementation. | |
505 | 8 | |a 10.4 Reduction to Normal Form10.5 Example Proof; 10.6 Rapid Prototype Compiler; 10.7 Mapping Normal Form into Hardware; 10.8 Conclusions; Part V: Technology Transfer; Chapter 11. Transfer into Industrial Design; 11.1 Historical Background; 11.2 Benefits from Formal Methods; 11.3 Technology Transfer Problems; 11.4 Requirements for Transfer of Formal Methods; 11.5 Methods for Transferring Formal Methods; 11.6 Technology Transfer from the SAFEMOS Project; Appendices: Related Work; Appendix A: System Verification andthe CLI Stack; A.1 Introduction; A.2 Our Philosophy of Systems Verification. | |
650 | 0 | |a Embedded computer systems |x Evaluation. | |
650 | 0 | |a Real-time data processing. | |
650 | 6 | |a Syst�emes enfouis (Informatique) |0 (CaQQLa)201-0171574 |x �Evaluation. |0 (CaQQLa)201-0379188 | |
650 | 6 | |a Temps r�eel (Informatique) |0 (CaQQLa)201-0017753 | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Embedded computer systems |x Evaluation. |2 fast |0 (OCoLC)fst00908302 | |
650 | 7 | |a Real-time data processing. |2 fast |0 (OCoLC)fst01091219 | |
650 | 7 | |a Echtzeitsystem |2 gnd |0 (DE-588)4131397-5 | |
650 | 7 | |a Technische Sicherheit |2 gnd |0 (DE-588)4059233-9 | |
650 | 7 | |a Verifikation |2 gnd |0 (DE-588)4135577-5 | |
700 | 1 | |a Bowen, J. P. |q (Jonathan Peter), |d 1956- | |
776 | 0 | 8 | |i Print version: |t Towards verified systems |z 0444899014 |w (DLC) 94030630 |w (OCoLC)30914198 |
830 | 0 | |a Real-time safety critical systems ; |v 2. | |
856 | 4 | 0 | |u https://sciencedirect.uam.elogim.com/science/book/9780444899019 |z Texto completo |
856 | 4 | 0 | |u https://sciencedirect.uam.elogim.com/science/bookseries/15725960/2 |z Texto completo |