Compositional Verification of Concurrent and Real-Time Systems:
With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, a...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Springer US
2002
|
Schriftenreihe: | The Springer International Series in Engineering and Computer Science
676 |
Schlagworte: | |
Online-Zugang: | FHI01 BTU01 URL des Erstveröffentlichers |
Zusammenfassung: | With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences |
Beschreibung: | 1 Online-Ressource (XIX, 196 p) |
ISBN: | 9781461510093 |
DOI: | 10.1007/978-1-4615-1009-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045148885 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 180827s2002 |||| o||u| ||||||eng d | ||
020 | |a 9781461510093 |9 978-1-4615-1009-3 | ||
024 | 7 | |a 10.1007/978-1-4615-1009-3 |2 doi | |
035 | |a (ZDB-2-ENG)978-1-4615-1009-3 | ||
035 | |a (OCoLC)1050933444 | ||
035 | |a (DE-599)BVBBV045148885 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-634 | ||
082 | 0 | |a 005.1 |2 23 | |
100 | 1 | |a Juan, Eric Y. T. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Compositional Verification of Concurrent and Real-Time Systems |c by Eric Y. T. Juan, Jeffrey J. P. Tsai |
264 | 1 | |a Boston, MA |b Springer US |c 2002 | |
300 | |a 1 Online-Ressource (XIX, 196 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a The Springer International Series in Engineering and Computer Science |v 676 | |
520 | |a With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences | ||
650 | 4 | |a Computer Science | |
650 | 4 | |a Software Engineering/Programming and Operating Systems | |
650 | 4 | |a Computing Methodologies | |
650 | 4 | |a Processor Architectures | |
650 | 4 | |a Special Purpose and Application-Based Systems | |
650 | 4 | |a Mechanical Engineering | |
650 | 4 | |a Computer science | |
650 | 4 | |a Microprocessors | |
650 | 4 | |a Special purpose computers | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Computers | |
650 | 4 | |a Mechanical engineering | |
700 | 1 | |a Tsai, Jeffrey J. P. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461353492 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4615-1009-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030538584 | ||
966 | e | |u https://doi.org/10.1007/978-1-4615-1009-3 |l FHI01 |p ZDB-2-ENG |q ZDB-2-ENG_2000/2004 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4615-1009-3 |l BTU01 |p ZDB-2-ENG |q ZDB-2-ENG_Archiv |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178819606642688 |
---|---|
any_adam_object | |
author | Juan, Eric Y. T. Tsai, Jeffrey J. P. |
author_facet | Juan, Eric Y. T. Tsai, Jeffrey J. P. |
author_role | aut aut |
author_sort | Juan, Eric Y. T. |
author_variant | e y t j eyt eytj j j p t jjp jjpt |
building | Verbundindex |
bvnumber | BV045148885 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)978-1-4615-1009-3 (OCoLC)1050933444 (DE-599)BVBBV045148885 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4615-1009-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03689nmm a2200541zcb4500</leader><controlfield tag="001">BV045148885</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180827s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461510093</subfield><subfield code="9">978-1-4615-1009-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-1009-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-1-4615-1009-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1050933444</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045148885</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Juan, Eric Y. T.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Compositional Verification of Concurrent and Real-Time Systems</subfield><subfield code="c">by Eric Y. T. Juan, Jeffrey J. P. Tsai</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Springer US</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 196 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Springer International Series in Engineering and Computer Science</subfield><subfield code="v">676</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering/Programming and Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Methodologies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Processor Architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Special Purpose and Application-Based Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mechanical Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microprocessors</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Special purpose computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mechanical engineering</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsai, Jeffrey J. P.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461353492</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-1009-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030538584</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-1009-3</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-1009-3</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_Archiv</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045148885 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:10:02Z |
institution | BVB |
isbn | 9781461510093 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030538584 |
oclc_num | 1050933444 |
open_access_boolean | |
owner | DE-573 DE-634 |
owner_facet | DE-573 DE-634 |
physical | 1 Online-Ressource (XIX, 196 p) |
psigel | ZDB-2-ENG ZDB-2-ENG_2000/2004 ZDB-2-ENG ZDB-2-ENG_2000/2004 ZDB-2-ENG ZDB-2-ENG_Archiv |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer US |
record_format | marc |
series2 | The Springer International Series in Engineering and Computer Science |
spelling | Juan, Eric Y. T. Verfasser aut Compositional Verification of Concurrent and Real-Time Systems by Eric Y. T. Juan, Jeffrey J. P. Tsai Boston, MA Springer US 2002 1 Online-Ressource (XIX, 196 p) txt rdacontent c rdamedia cr rdacarrier The Springer International Series in Engineering and Computer Science 676 With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences Computer Science Software Engineering/Programming and Operating Systems Computing Methodologies Processor Architectures Special Purpose and Application-Based Systems Mechanical Engineering Computer science Microprocessors Special purpose computers Software engineering Computers Mechanical engineering Tsai, Jeffrey J. P. aut Erscheint auch als Druck-Ausgabe 9781461353492 https://doi.org/10.1007/978-1-4615-1009-3 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Juan, Eric Y. T. Tsai, Jeffrey J. P. Compositional Verification of Concurrent and Real-Time Systems Computer Science Software Engineering/Programming and Operating Systems Computing Methodologies Processor Architectures Special Purpose and Application-Based Systems Mechanical Engineering Computer science Microprocessors Special purpose computers Software engineering Computers Mechanical engineering |
title | Compositional Verification of Concurrent and Real-Time Systems |
title_auth | Compositional Verification of Concurrent and Real-Time Systems |
title_exact_search | Compositional Verification of Concurrent and Real-Time Systems |
title_full | Compositional Verification of Concurrent and Real-Time Systems by Eric Y. T. Juan, Jeffrey J. P. Tsai |
title_fullStr | Compositional Verification of Concurrent and Real-Time Systems by Eric Y. T. Juan, Jeffrey J. P. Tsai |
title_full_unstemmed | Compositional Verification of Concurrent and Real-Time Systems by Eric Y. T. Juan, Jeffrey J. P. Tsai |
title_short | Compositional Verification of Concurrent and Real-Time Systems |
title_sort | compositional verification of concurrent and real time systems |
topic | Computer Science Software Engineering/Programming and Operating Systems Computing Methodologies Processor Architectures Special Purpose and Application-Based Systems Mechanical Engineering Computer science Microprocessors Special purpose computers Software engineering Computers Mechanical engineering |
topic_facet | Computer Science Software Engineering/Programming and Operating Systems Computing Methodologies Processor Architectures Special Purpose and Application-Based Systems Mechanical Engineering Computer science Microprocessors Special purpose computers Software engineering Computers Mechanical engineering |
url | https://doi.org/10.1007/978-1-4615-1009-3 |
work_keys_str_mv | AT juanericyt compositionalverificationofconcurrentandrealtimesystems AT tsaijeffreyjp compositionalverificationofconcurrentandrealtimesystems |