Cargando…

Towards verified systems /

As the complexity of embedded computer-controlled systems increases, the present industrial practice for their development gives cause for concern, especially for safety-critical applications where human lives are at stake. The use of software in such systems has increased enormously in the last dec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bowen, J. P. (Jonathan Peter), 1956-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; New York : Elsevier, 1994.
Colección:Real-time safety critical systems ; 2.
Temas:
Acceso en línea:Texto completo
Texto completo
Tabla de Contenidos:
  • Front Cover; Towards Verified Systems; Copyright Page; Table of Contents; List of Figures; List of Tables; Dedication; Foreword; Preface; Contact Addresses; Part I: Introduction; Chapter 1. Safety-Critical Systems and Formal Methods; 1.1 A Brief Historical Perspective; 1.2 Safety-critical Computer Systems; 1.3 Industrial-scale Examples of Use; 1.4 Areas of Application of Formal Methods; 1.5 Safety Standards; 1.6 Discussion; Acknowledgements; Chapter 2. Overview of the Project; 2.1 The SAFEMOS Project; 2.2 System Modelling; 2.3 Software Development and Compilation.
  • 2.4 Hardware Design and Compilation2.5 Other SAFEMOS Project Work; 2.6 Related Work; 2.7 Conclusion; Part II: Tools and Models; Chapter 3. The HOL Logic and System; 3.1 Introduction; 3.2 The HOL Logic; 3.3 The HOL System; Chapter 4. Timed Transition Systems; 4.1 Introduction to TTSs and HOL; 4.2 Example: A Traffic Light Controller; 4.3 A Real-Time Temporal Logic; 4.4 Timed Transition Systems; 4.5 Timed Transition Diagrams; 4.6 Verification; 4.7 Discussion; Part III: Software; Chapter 5. State Transition Assertions:A Case Study; 5.1 Introduction; 5.2 An Example: Mult.
  • 5.3 A More Detailed Specification of Mult5.4 Determining a Machine from a Program; 5.5 State Transition Assertions; 5.6 Formal Specification of Mult; 5.7 Correctness of MultProg; 5.8 Generating Atomic STAs; 5.9 Laws for Combining STAs; 5.10 Conclusions; Chapter 6. A Real-time ProgrammingLanguage; 6.1 The SAFE Programming Language; 6.2 Interval Model; 6.3 Interval Semantics; 6.4 SAFE Semantics; 6.5 Laws; 6.6 Conclusion; Chapter 7. Program Compilation; 7.1 Machine Language Syntax; 7.2 Machine Language Semantics; 7.3 Compiler Specification; 7.4 Correctness of Compilation.
  • 7.5 Proof of Correctness of Compilation7.6 Conclusion; Part IV: Hardware; Chapter 8. A Framework for MicroprocessorDesign; 8.1 Introduction; 8.2 Machine Specification Framework; 8.3 Microcoded Machine Example; 8.4 Incremental Model of Control Memory; 8.5 Summary; Chapter 9. Designing a Processor; 9.1 Instruction Set and Machine Architecture; 9.2 Top Level Specification; 9.3 Microcoded Implementation; 9.4 Low-level Implementation; 9.5 Conclusions; Chapter 10. Hardware Compilation; 10.1 Introduction; 10.2 A Language of Communicating Processes; 10.3 Normal Form Implementation.
  • 10.4 Reduction to Normal Form10.5 Example Proof; 10.6 Rapid Prototype Compiler; 10.7 Mapping Normal Form into Hardware; 10.8 Conclusions; Part V: Technology Transfer; Chapter 11. Transfer into Industrial Design; 11.1 Historical Background; 11.2 Benefits from Formal Methods; 11.3 Technology Transfer Problems; 11.4 Requirements for Transfer of Formal Methods; 11.5 Methods for Transferring Formal Methods; 11.6 Technology Transfer from the SAFEMOS Project; Appendices: Related Work; Appendix A: System Verification andthe CLI Stack; A.1 Introduction; A.2 Our Philosophy of Systems Verification.