[图书][B] Data refinement: model-oriented proof methods and their comparison

WP De Roever, K Engelhardt - 1998 - books.google.com
The goal of this book is to provide a comprehensive and systematic introduction to the
important and highly applicable method of data refinement and the simulation methods used …

[图书][B] Validated designs for object-oriented systems

J Fitzgerald - 2005 - books.google.com
Object-oriented design methods are commonplace in computing systems development, but
are often dismissed as' boxes & arrows'. If systems developers are to gain full advantage …

[图书][B] Applications of formal methods

MG Hinchey, JP Bowen - 1995 - researchgate.net
The main goal of the series has been to develop, illustrate and promulgate the scientific
basis of computer programming, and its application in software engineering on an industrial …

Elements of style: Analyzing a software design feature with a counterexample detector

D Jackson, CA Damon - ACM SIGSOFT Software Engineering Notes, 1996 - dl.acm.org
We illustrate the application of Nitpick, a specification checker, to the design of a style
mechanism for a word processor. The design is cast, along with some expected properties …

[图书][B] Specification of software systems

VS Alagar, K Periyasamy - 2011 - books.google.com
Recent advances in software specification methods, model checking, and theorem proving
have generated new tools for the use of formal methods in both industry and academia. Yet …

How the design of JML accommodates both runtime assertion checking and formal verification

GT Leavens, Y Cheon, C Clifton, C Ruby… - Science of Computer …, 2005 - Elsevier
Specifications that are used in detailed design and in the documentation of existing code are
primarily written and read by programmers. However, most formal specification languages …

A purpose-based access control model

N Yang, H Barringer, N Zhang - Third international symposium …, 2007 - ieeexplore.ieee.org
Achieving privacy preservation in a data-sharing computing environment is a challenging
problem. The requirements for a privacy preserving data access policy should be formally …

The knowledge acquisition and representation language, KARL

D Fensel, J Angele, R Studer - IEEE Transactions on …, 1998 - ieeexplore.ieee.org
The Knowledge Acquisition and Representation Language (KARL) combines a description
of a knowledge based system at the conceptual level (a so called model of expertise) with a …

[PDF][PDF] VDMTools: advances in support for formal modeling in VDM

J Fitzgerald, PG Larsen, S Sahara - ACM Sigplan Notices, 2008 - academia.edu
We describe the current status of “VDMTools”, a group of tools supporting the analysis of
system models expressed in the formal language of the Vienna Development Method. Three …

[图书][B] Specification in B: An introduction using the B toolkit

H Haughton, K Lano - 1996 - books.google.com
This book gives a practical introduction to the B specification language and method, an
approach to the development of high-quality software using rigorous CASE techniques. It is …