|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
b3238459 |
003 |
MWH |
005 |
20191024011211.0 |
007 |
cr nn 008mamaa |
008 |
121227s2002 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781461510093
|
024 |
7 |
|
|a 10.1007/978-1-4615-1009-3
|2 doi
|
035 |
|
|
|a (DE-He213)978-1-4615-1009-3
|
050 |
|
4 |
|a E-Book
|
072 |
|
7 |
|a UMZ
|2 bicssc
|
072 |
|
7 |
|a COM051230
|2 bisacsh
|
072 |
|
7 |
|a UMZ
|2 thema
|
072 |
|
7 |
|a UL
|2 thema
|
100 |
1 |
|
|a Juan, Eric Y.T.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Compositional Verification of Concurrent and Real-Time Systems
|h [electronic resource] /
|c by Eric Y.T. Juan, Jeffrey J.P. Tsai.
|
250 |
|
|
|a 1st ed. 2002.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2002.
|
300 |
|
|
|a XIX, 196 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a The Springer International Series in Engineering and Computer Science,
|x 0893-3405 ;
|v 676
|
490 |
1 |
|
|a Springer eBook Collection
|
505 |
0 |
|
|a 1. Introduction -- 1. Background -- 2. State Explosion -- 3. Compositional Verification -- 4. A Compositional Verification Methodology -- 5. Reduction Methods for Real-Time Systems -- 2. Verification Techniques for Concurrent Systems -- 1. Techniques for Efficient Analysis of Concurrent Systems -- 2. Compositional-Verification Techniques -- 3. Petri-Net Based Techniques for Real-Time Systems -- 3. Multiset Labeled Transition Systems -- 1. The Model -- 2. Communication Diagrams -- 3. Function “Parallel Composition” (?) of MLTSs -- 4. Function “Hiding Invisible Actions (Hide)” of MLTSs -- 5. Parallel Operation of MLTSs -- 4. Compositional Verification Using MLTS -- 1. Equivalences, Synonyms, and Congruences -- 2. Paths, Traces, and IO-Traces -- 3. IOT-Failures-Divergence (IOTFD) Equivalence -- 4. IOTFD-Equivalence Reduction -- 5. Algorithms and Proofs -- 5. Composotional Verification Using Petri Nets -- 1. The Models -- 2. Function “Parallel Composition” -- 3. Synonymous Reduction -- 4. Compositional Verification of Condensed MLTSs -- 5. Condensation Theories for State-Based Systems -- 6. Condensation Rules for IOT-State/IOT-Failure Equivalences -- 7. Firing Dependence Theories and Rules for MLTS*s -- 8. Compositional Verification of Sub-Marking Reachability -- 9. Definitions, Algorithms, and Proofs -- 6. Tools and Experiments -- 1. Alternating Bit Protocol (ABP) -- 2. Tools -- 3. Performance Evaluation -- 7. Delay Time Petri Nets and Net Reduction -- 1. Time Petri Nets -- 2. Delay Time Petri Nets (DTPNs) -- 3. Reduction Rules for DTPNs -- 4. Class Graphs of DTPNs -- 5. Efficiency Consideration and Experimental Results -- References.
|
520 |
|
|
|a With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.
|
590 |
|
|
|a Loaded electronically.
|
590 |
|
|
|a Electronic access restricted to members of the Holy Cross Community.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Microprocessors.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Mechanical engineering.
|
690 |
|
|
|a Electronic resources (E-books)
|
700 |
1 |
|
|a Tsai, Jeffrey J.P.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
830 |
|
0 |
|a The Springer International Series in Engineering and Computer Science,
|x 0893-3405 ;
|v 676
|
830 |
|
0 |
|a Springer eBook Collection.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-1-4615-1009-3
|3 Click to view e-book
|
907 |
|
|
|a .b32384592
|b 04-18-22
|c 02-26-20
|
998 |
|
|
|a he
|b 02-26-20
|c m
|d @
|e -
|f eng
|g xxu
|h 0
|i 1
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Engineering (Springer-11647)
|
902 |
|
|
|a springer purchased ebooks
|
903 |
|
|
|a SEB-COLL
|
945 |
|
|
|f - -
|g 1
|h 0
|j - -
|k - -
|l he
|o -
|p $0.00
|q -
|r -
|s b
|t 38
|u 0
|v 0
|w 0
|x 0
|y .i21516248
|z 02-26-20
|
999 |
f |
f |
|i 79d54d9c-8ca8-5b9c-b69e-5937dbbf4b88
|s a970237a-a87f-5954-a125-26443ed931ee
|
952 |
f |
f |
|p Online
|a College of the Holy Cross
|b Main Campus
|c E-Resources
|d Online
|e E-Book
|h Library of Congress classification
|i Elec File
|n 1
|