Leveraging applications of formal methods, verification, and validation: 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
|
Schriftenreihe: | Lecture notes in computer science
... |
Schlagworte: | |
Beschreibung: | Literaturangaben |
Internformat
MARC
LEADER | 00000nam a2200000 ca4500 | ||
---|---|---|---|
001 | BV036767326 | ||
003 | DE-604 | ||
005 | 20130215 | ||
007 | t| | ||
008 | 101110nuuuuuuuuxx |||| 10||| eng d | ||
016 | 7 | |a 100786169X |2 DE-101 | |
035 | |a (DE-599)DNB100786169X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.12 |2 22/ger | |
082 | 0 | |a 004.21 |2 22/ger | |
084 | |a DAT 510f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 310f |2 stub | ||
084 | |a DAT 325f |2 stub | ||
245 | 1 | 0 | |a Leveraging applications of formal methods, verification, and validation |b 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings |c Tiziana Margaria ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer | |
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Lecture notes in computer science |v ... | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareplattform |0 (DE-588)4702244-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmanalyse |0 (DE-588)4175841-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eingebettetes System |0 (DE-588)4396978-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmverifikation |0 (DE-588)4135576-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Systemanalyse |0 (DE-588)4116673-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verifikation |0 (DE-588)4135577-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Systementwurf |0 (DE-588)4261480-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Iraklion |2 gnd-content | |
689 | 0 | 0 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 0 | 1 | |a Programmanalyse |0 (DE-588)4175841-9 |D s |
689 | 0 | 2 | |a Programmverifikation |0 (DE-588)4135576-3 |D s |
689 | 0 | 3 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Systementwurf |0 (DE-588)4261480-6 |D s |
689 | 1 | 1 | |a Systemanalyse |0 (DE-588)4116673-5 |D s |
689 | 1 | 2 | |a Verifikation |0 (DE-588)4135577-5 |D s |
689 | 1 | 3 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Eingebettetes System |0 (DE-588)4396978-1 |D s |
689 | 2 | 1 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 2 | 2 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 2 | 3 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 3 | 1 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 3 | 2 | |a Softwareplattform |0 (DE-588)4702244-9 |D s |
689 | 3 | 3 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Margaria, Tiziana |e Sonstige |4 oth | |
711 | 2 | |a ISoLA |n 4 |d 2010 |c Heraklion |j Sonstige |0 (DE-588)16087275-3 |4 oth | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020684245 |
Datensatz im Suchindex
_version_ | 1820875276779782144 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV036767326 |
classification_rvk | SS 4800 |
classification_tum | DAT 510f DAT 310f DAT 325f |
ctrlnum | (DE-599)DNB100786169X |
dewey-full | 005.12 004.21 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security 004 - Computer science |
dewey-raw | 005.12 004.21 |
dewey-search | 005.12 004.21 |
dewey-sort | 15.12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 ca4500</leader><controlfield tag="001">BV036767326</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130215</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">101110nuuuuuuuuxx |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">100786169X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB100786169X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.12</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.21</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 510f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 310f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 325f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Leveraging applications of formal methods, verification, and validation</subfield><subfield code="b">4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings</subfield><subfield code="c">Tiziana Margaria ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">...</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareplattform</subfield><subfield code="0">(DE-588)4702244-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmanalyse</subfield><subfield code="0">(DE-588)4175841-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systemanalyse</subfield><subfield code="0">(DE-588)4116673-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systementwurf</subfield><subfield code="0">(DE-588)4261480-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Iraklion</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Programmanalyse</subfield><subfield code="0">(DE-588)4175841-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Systementwurf</subfield><subfield code="0">(DE-588)4261480-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Systemanalyse</subfield><subfield code="0">(DE-588)4116673-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Softwareplattform</subfield><subfield code="0">(DE-588)4702244-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Margaria, Tiziana</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISoLA</subfield><subfield code="n">4</subfield><subfield code="d">2010</subfield><subfield code="c">Heraklion</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16087275-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020684245</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Iraklion gnd-content |
genre_facet | Konferenzschrift 2010 Iraklion |
id | DE-604.BV036767326 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:13:03Z |
institution | BVB |
institution_GND | (DE-588)16087275-3 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020684245 |
open_access_boolean | |
publishDateSort | 0000 |
publisher | Springer |
record_format | marc |
series2 | Lecture notes in computer science |
spelling | Leveraging applications of formal methods, verification, and validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings Tiziana Margaria ... (eds.) Berlin [u.a.] Springer txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science ... Literaturangaben Formale Methode (DE-588)4333722-3 gnd rswk-swf Internet der Dinge (DE-588)7713781-4 gnd rswk-swf Softwareplattform (DE-588)4702244-9 gnd rswk-swf Programmanalyse (DE-588)4175841-9 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Eingebettetes System (DE-588)4396978-1 gnd rswk-swf Programmverifikation (DE-588)4135576-3 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf Systemanalyse (DE-588)4116673-5 gnd rswk-swf Verifikation (DE-588)4135577-5 gnd rswk-swf Systementwurf (DE-588)4261480-6 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Iraklion gnd-content Softwareentwicklung (DE-588)4116522-6 s Programmanalyse (DE-588)4175841-9 s Programmverifikation (DE-588)4135576-3 s Formale Methode (DE-588)4333722-3 s DE-604 Systementwurf (DE-588)4261480-6 s Systemanalyse (DE-588)4116673-5 s Verifikation (DE-588)4135577-5 s Eingebettetes System (DE-588)4396978-1 s Sicherheitskritisches System (DE-588)4767762-4 s World Wide Web (DE-588)4363898-3 s Softwareplattform (DE-588)4702244-9 s Internet der Dinge (DE-588)7713781-4 s Margaria, Tiziana Sonstige oth ISoLA 4 2010 Heraklion Sonstige (DE-588)16087275-3 oth |
spellingShingle | Leveraging applications of formal methods, verification, and validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings Formale Methode (DE-588)4333722-3 gnd Internet der Dinge (DE-588)7713781-4 gnd Softwareplattform (DE-588)4702244-9 gnd Programmanalyse (DE-588)4175841-9 gnd World Wide Web (DE-588)4363898-3 gnd Eingebettetes System (DE-588)4396978-1 gnd Programmverifikation (DE-588)4135576-3 gnd Softwareentwicklung (DE-588)4116522-6 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Systemanalyse (DE-588)4116673-5 gnd Verifikation (DE-588)4135577-5 gnd Systementwurf (DE-588)4261480-6 gnd |
subject_GND | (DE-588)4333722-3 (DE-588)7713781-4 (DE-588)4702244-9 (DE-588)4175841-9 (DE-588)4363898-3 (DE-588)4396978-1 (DE-588)4135576-3 (DE-588)4116522-6 (DE-588)4767762-4 (DE-588)4116673-5 (DE-588)4135577-5 (DE-588)4261480-6 (DE-588)1071861417 |
title | Leveraging applications of formal methods, verification, and validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings |
title_auth | Leveraging applications of formal methods, verification, and validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings |
title_exact_search | Leveraging applications of formal methods, verification, and validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings |
title_full | Leveraging applications of formal methods, verification, and validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings Tiziana Margaria ... (eds.) |
title_fullStr | Leveraging applications of formal methods, verification, and validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings Tiziana Margaria ... (eds.) |
title_full_unstemmed | Leveraging applications of formal methods, verification, and validation 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings Tiziana Margaria ... (eds.) |
title_short | Leveraging applications of formal methods, verification, and validation |
title_sort | leveraging applications of formal methods verification and validation 4th international symposium on leveraging applications isola 2010 heraklion crete greece october 18 21 2010 proceedings |
title_sub | 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18 - 21, 2010 ; proceedings |
topic | Formale Methode (DE-588)4333722-3 gnd Internet der Dinge (DE-588)7713781-4 gnd Softwareplattform (DE-588)4702244-9 gnd Programmanalyse (DE-588)4175841-9 gnd World Wide Web (DE-588)4363898-3 gnd Eingebettetes System (DE-588)4396978-1 gnd Programmverifikation (DE-588)4135576-3 gnd Softwareentwicklung (DE-588)4116522-6 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Systemanalyse (DE-588)4116673-5 gnd Verifikation (DE-588)4135577-5 gnd Systementwurf (DE-588)4261480-6 gnd |
topic_facet | Formale Methode Internet der Dinge Softwareplattform Programmanalyse World Wide Web Eingebettetes System Programmverifikation Softwareentwicklung Sicherheitskritisches System Systemanalyse Verifikation Systementwurf Konferenzschrift 2010 Iraklion |
work_keys_str_mv | AT margariatiziana leveragingapplicationsofformalmethodsverificationandvalidation4thinternationalsymposiumonleveragingapplicationsisola2010heraklioncretegreeceoctober18212010proceedings AT isolaheraklion leveragingapplicationsofformalmethodsverificationandvalidation4thinternationalsymposiumonleveragingapplicationsisola2010heraklioncretegreeceoctober18212010proceedings |