Software Reliability Methods:
Many books focus on increasing the quality of software through the use of formal methods. However, most books embrace one particular method, and present it as the suggested solution for the software reliability problem. This book presents a wider picture of formal methods, through a collection of no...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer New York
2001
|
Ausgabe: | 1st ed. 2001 |
Schriftenreihe: | Texts in Computer Science
|
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Zusammenfassung: | Many books focus on increasing the quality of software through the use of formal methods. However, most books embrace one particular method, and present it as the suggested solution for the software reliability problem. This book presents a wider picture of formal methods, through a collection of notations and techniques. It compares them, and discusses their advantages and disadvantages. One of the main challenges of formal methods is in transferring the tech nology developed by researchers to the software development community. Re cently, we seem to be starting to have a better understanding of the important ingredients of formal methods tools. This manifests itself in the growing ac ceptance of such tools in the software and hardware development industry. Ideally, formal methods need to be intuitive to use (preferably using graphi cal interfaces), do not impose on the user an extensive learning period, and incur only small overhead to the development process. Formal methods are much more acceptable today than ten or twenty years ago, in particular in the hardware industry. Yet there is still a lively contention between different approaches |
Beschreibung: | 1 Online-Ressource (XIX, 332 p) |
ISBN: | 9781475735406 |
DOI: | 10.1007/978-1-4757-3540-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064234 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2001 |||| o||u| ||||||eng d | ||
020 | |a 9781475735406 |9 978-1-4757-3540-6 | ||
024 | 7 | |a 10.1007/978-1-4757-3540-6 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4757-3540-6 | ||
035 | |a (OCoLC)1227476943 | ||
035 | |a (DE-599)BVBBV047064234 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.1 |2 23 | |
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
084 | |a ST 233 |0 (DE-625)143620: |2 rvk | ||
100 | 1 | |a Peled, Doron A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Software Reliability Methods |c by Doron A. Peled |
250 | |a 1st ed. 2001 | ||
264 | 1 | |a New York, NY |b Springer New York |c 2001 | |
300 | |a 1 Online-Ressource (XIX, 332 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Texts in Computer Science | |
520 | |a Many books focus on increasing the quality of software through the use of formal methods. However, most books embrace one particular method, and present it as the suggested solution for the software reliability problem. This book presents a wider picture of formal methods, through a collection of notations and techniques. It compares them, and discusses their advantages and disadvantages. One of the main challenges of formal methods is in transferring the tech nology developed by researchers to the software development community. Re cently, we seem to be starting to have a better understanding of the important ingredients of formal methods tools. This manifests itself in the growing ac ceptance of such tools in the software and hardware development industry. Ideally, formal methods need to be intuitive to use (preferably using graphi cal interfaces), do not impose on the user an extensive learning period, and incur only small overhead to the development process. Formal methods are much more acceptable today than ten or twenty years ago, in particular in the hardware industry. Yet there is still a lively contention between different approaches | ||
650 | 4 | |a Software Engineering/Programming and Operating Systems | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Programming Techniques | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer programming | |
650 | 0 | 7 | |a Softwaretest |0 (DE-588)4132652-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Methode |0 (DE-588)4038971-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Reliabilität |0 (DE-588)4213628-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Qualitätssicherung |0 (DE-588)4126457-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prüfung |0 (DE-588)4047609-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 0 | 1 | |a Reliabilität |0 (DE-588)4213628-3 |D s |
689 | 0 | 2 | |a Prüfung |0 (DE-588)4047609-1 |D s |
689 | 0 | 3 | |a Methode |0 (DE-588)4038971-6 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Softwaretest |0 (DE-588)4132652-0 |D s |
689 | 1 | 1 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Softwaretest |0 (DE-588)4132652-0 |D s |
689 | 2 | 1 | |a Qualitätssicherung |0 (DE-588)4126457-5 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 3 | 1 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 3 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781441928764 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387951065 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475735413 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4757-3540-6 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471346 | ||
966 | e | |u https://doi.org/10.1007/978-1-4757-3540-6 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061991329792 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Peled, Doron A. |
author_facet | Peled, Doron A. |
author_role | aut |
author_sort | Peled, Doron A. |
author_variant | d a p da dap |
building | Verbundindex |
bvnumber | BV047064234 |
classification_rvk | ST 230 ST 233 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4757-3540-6 (OCoLC)1227476943 (DE-599)BVBBV047064234 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4757-3540-6 |
edition | 1st ed. 2001 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04066nmm a2200769zc 4500</leader><controlfield tag="001">BV047064234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781475735406</subfield><subfield code="9">978-1-4757-3540-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4757-3540-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4757-3540-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227476943</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064234</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 233</subfield><subfield code="0">(DE-625)143620:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Peled, Doron A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software Reliability Methods</subfield><subfield code="c">by Doron A. Peled</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2001</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer New York</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 332 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Texts in Computer Science</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Many books focus on increasing the quality of software through the use of formal methods. However, most books embrace one particular method, and present it as the suggested solution for the software reliability problem. This book presents a wider picture of formal methods, through a collection of notations and techniques. It compares them, and discusses their advantages and disadvantages. One of the main challenges of formal methods is in transferring the tech nology developed by researchers to the software development community. Re cently, we seem to be starting to have a better understanding of the important ingredients of formal methods tools. This manifests itself in the growing ac ceptance of such tools in the software and hardware development industry. Ideally, formal methods need to be intuitive to use (preferably using graphi cal interfaces), do not impose on the user an extensive learning period, and incur only small overhead to the development process. Formal methods are much more acceptable today than ten or twenty years ago, in particular in the hardware industry. Yet there is still a lively contention between different approaches</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering/Programming and Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwaretest</subfield><subfield code="0">(DE-588)4132652-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Methode</subfield><subfield code="0">(DE-588)4038971-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Reliabilität</subfield><subfield code="0">(DE-588)4213628-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Qualitätssicherung</subfield><subfield code="0">(DE-588)4126457-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prüfung</subfield><subfield code="0">(DE-588)4047609-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Reliabilität</subfield><subfield code="0">(DE-588)4213628-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Prüfung</subfield><subfield code="0">(DE-588)4047609-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Methode</subfield><subfield code="0">(DE-588)4038971-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Softwaretest</subfield><subfield code="0">(DE-588)4132652-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Softwaretest</subfield><subfield code="0">(DE-588)4132652-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Qualitätssicherung</subfield><subfield code="0">(DE-588)4126457-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781441928764</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387951065</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475735413</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4757-3540-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471346</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4757-3540-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064234 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9781475735406 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471346 |
oclc_num | 1227476943 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XIX, 332 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Springer New York |
record_format | marc |
series2 | Texts in Computer Science |
spelling | Peled, Doron A. Verfasser aut Software Reliability Methods by Doron A. Peled 1st ed. 2001 New York, NY Springer New York 2001 1 Online-Ressource (XIX, 332 p) txt rdacontent c rdamedia cr rdacarrier Texts in Computer Science Many books focus on increasing the quality of software through the use of formal methods. However, most books embrace one particular method, and present it as the suggested solution for the software reliability problem. This book presents a wider picture of formal methods, through a collection of notations and techniques. It compares them, and discusses their advantages and disadvantages. One of the main challenges of formal methods is in transferring the tech nology developed by researchers to the software development community. Re cently, we seem to be starting to have a better understanding of the important ingredients of formal methods tools. This manifests itself in the growing ac ceptance of such tools in the software and hardware development industry. Ideally, formal methods need to be intuitive to use (preferably using graphi cal interfaces), do not impose on the user an extensive learning period, and incur only small overhead to the development process. Formal methods are much more acceptable today than ten or twenty years ago, in particular in the hardware industry. Yet there is still a lively contention between different approaches Software Engineering/Programming and Operating Systems Computer Communication Networks Programming Techniques Software engineering Computer communication systems Computer programming Softwaretest (DE-588)4132652-0 gnd rswk-swf Methode (DE-588)4038971-6 gnd rswk-swf Softwarewerkzeug (DE-588)4116526-3 gnd rswk-swf Software (DE-588)4055382-6 gnd rswk-swf Zuverlässigkeit (DE-588)4059245-5 gnd rswk-swf Reliabilität (DE-588)4213628-3 gnd rswk-swf Qualitätssicherung (DE-588)4126457-5 gnd rswk-swf Prüfung (DE-588)4047609-1 gnd rswk-swf Software (DE-588)4055382-6 s Reliabilität (DE-588)4213628-3 s Prüfung (DE-588)4047609-1 s Methode (DE-588)4038971-6 s DE-604 Softwaretest (DE-588)4132652-0 s Softwarewerkzeug (DE-588)4116526-3 s Qualitätssicherung (DE-588)4126457-5 s Zuverlässigkeit (DE-588)4059245-5 s Erscheint auch als Druck-Ausgabe 9781441928764 Erscheint auch als Druck-Ausgabe 9780387951065 Erscheint auch als Druck-Ausgabe 9781475735413 https://doi.org/10.1007/978-1-4757-3540-6 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Peled, Doron A. Software Reliability Methods Software Engineering/Programming and Operating Systems Computer Communication Networks Programming Techniques Software engineering Computer communication systems Computer programming Softwaretest (DE-588)4132652-0 gnd Methode (DE-588)4038971-6 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Software (DE-588)4055382-6 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Reliabilität (DE-588)4213628-3 gnd Qualitätssicherung (DE-588)4126457-5 gnd Prüfung (DE-588)4047609-1 gnd |
subject_GND | (DE-588)4132652-0 (DE-588)4038971-6 (DE-588)4116526-3 (DE-588)4055382-6 (DE-588)4059245-5 (DE-588)4213628-3 (DE-588)4126457-5 (DE-588)4047609-1 |
title | Software Reliability Methods |
title_auth | Software Reliability Methods |
title_exact_search | Software Reliability Methods |
title_exact_search_txtP | Software Reliability Methods |
title_full | Software Reliability Methods by Doron A. Peled |
title_fullStr | Software Reliability Methods by Doron A. Peled |
title_full_unstemmed | Software Reliability Methods by Doron A. Peled |
title_short | Software Reliability Methods |
title_sort | software reliability methods |
topic | Software Engineering/Programming and Operating Systems Computer Communication Networks Programming Techniques Software engineering Computer communication systems Computer programming Softwaretest (DE-588)4132652-0 gnd Methode (DE-588)4038971-6 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Software (DE-588)4055382-6 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Reliabilität (DE-588)4213628-3 gnd Qualitätssicherung (DE-588)4126457-5 gnd Prüfung (DE-588)4047609-1 gnd |
topic_facet | Software Engineering/Programming and Operating Systems Computer Communication Networks Programming Techniques Software engineering Computer communication systems Computer programming Softwaretest Methode Softwarewerkzeug Software Zuverlässigkeit Reliabilität Qualitätssicherung Prüfung |
url | https://doi.org/10.1007/978-1-4757-3540-6 |
work_keys_str_mv | AT peleddorona softwarereliabilitymethods |