Muutke küpsiste eelistusi

E-raamat: Engineering Trustworthy Software Systems: First International School, SETSS 2014, Chongqing, China, September 8-13, 2014. Tutorial Lectures

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This volume contains the lecture notes of the five coursesand one seminar given at the School on Engineering Trustworthy Software Systems(SETSS 2014), held in September 2014 at Southwest University in Chongqing,China.The material is useful for postgraduate students,researchers, academics and industrial engineers who are interested in thetheory and practice of methods and tools for the design and programming oftrustworthy software systems. The common themes of the courses include thedesign and use of theories, techniques and tools for software specification andmodeling, analysis and verification. The courses cover sequential programming,component- and object software, hybrid systems and cyber-physical systems withchallenges of termination, security, safety, security, fault-tolerance andreal-time requirements. The techniques include model checking, correctness byconstruction through refinement and model transformations, synthesis andcomputer algebra.

(In-)formal methods: The Lost Art.- Program refinement, perfect secrecy and information flow.- The Z Notation: Whence the Cause and Whither the Course .- Model-Driven Design of Object and Component Systems.- Cyber-Physical Systems Engineering.- Combining Formal and Informal Methods in the Design of Spacecrafts.
(In-)Formal Methods: The Lost Art: A Users' Manual
1(79)
Carroll Morgan
Program Refinement, Perfect Secrecy and Information Flow
80(23)
Annabelle K. McIver
The Z Notation: Whence the Cause and Whither the Course?
103(49)
Jonathan P. Bowen
Model-Driven Design of Object and Component Systems
152(104)
Zhiming Liu
Xiaohong Chen
Cyber-Physical Systems Engineering
256(34)
Bernd-Holger Schlingloff
Combining Formal and Informal Methods in the Design of Spacecrafts
290(35)
Mengfei Yang
Naijun Zhan
Author Index 325