Sciweavers

5255 search results - page 62 / 1051
» Formal Methods for Privacy
Sort
View
COMPSAC
1997
IEEE
14 years 2 months ago
The use of industrial-strength formal methods
Formal methods are used in a surprisingly wide variety of applications and ways throughout the world. While they may still’be considered a niche market, there is growing evidenc...
Jonathan P. Bowen, Michael G. Hinchey
FMOODS
2007
13 years 11 months ago
KeY: A Formal Method for Object-Oriented Systems
Abstract. This paper gives an overview of the KeY approach and highlights the main features of the KeY system. KeY is an approach (and a system) for the deductive verification of ...
Wolfgang Ahrendt, Bernhard Beckert, Reiner Hä...
TFM
2009
Springer
136views Formal Methods» more  TFM 2009»
14 years 4 months ago
On Teaching Formal Methods: Behavior Models and Code Analysis
Abstract. Teaching formal methods is a challenging task for several reasons. First, both the state-of-the-art knowledge and the tools are rapidly evolving. Second, there are no com...
Jan Kofron, Pavel Parizek, Ondrej Sery
SAFECOMP
1998
Springer
14 years 2 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
TSE
1998
131views more  TSE 1998»
13 years 9 months ago
Experiences Using Lightweight Formal Methods for Requirements Modeling
—This paper describes three case studies in the lightweight application of formal methods to requirements modeling for spacecraft fault protection systems. The case studies diffe...
Steve M. Easterbrook, Robyn R. Lutz, Richard Covin...