Cantitate/Preț
Produs

Leveraging Applications of Formal Methods, Verification, and Validation: 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I: Lecture Notes in Computer Science, cartea 6415

Editat de Tiziana Margaria, Bernhard Steffen
en Limba Engleză Paperback – 19 oct 2010

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 33098 lei  3-5 săpt.
  Springer Berlin, Heidelberg – 19 oct 2010 33098 lei  3-5 săpt.
  Springer Berlin, Heidelberg – 19 oct 2010 64145 lei  3-5 săpt.

Din seria Lecture Notes in Computer Science

Preț: 64145 lei

Preț vechi: 80181 lei
-20% Nou

Puncte Express: 962

Preț estimativ în valută:
11350 13328$ 9963£

Carte disponibilă

Livrare economică 06-20 ianuarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642165573
ISBN-10: 3642165575
Pagini: 708
Ilustrații: XX, 708 p. 220 illus.
Greutate: 1.02 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Theoretical Computer Science and General Issues

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

New Challenges in the Development of Critical Embedded Systems – An “aeromotive” Perspective.- New Challenges in the Development of Critical Embedded Systems—An “aeromotive” Perspective.- Certification of Embedded Software – Impact of ISO DIS 26262 in the Automotive Domain.- Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns.- Seamless Model-Driven Development Put into Practice.- Timely Time Estimates.- Compiler-Support for Robust Multi-core Computing.- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems.- Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems.- Analyzing the Security in the GSM Radio Network Using Attack Jungles.- Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method.- Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset.- Contract-Based Slicing.- Worst-Case Traversal Time (WCTT).- Special Track on Worst Case Traversal Time (WCTT).- The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus.- NC-Maude: A Rewriting Tool to Play with Network Calculus.- DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems.- A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling.- Flow Control with (Min,+) Algebra.- An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks.- Towards Resource-Optimal Routing Plans for Real-Time Traffic.- Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet.- Analyzing End-to-End Functional Delays on an IMA Platform.- Tools in Scientific Workflow Composition.- Toolsin Scientific Workflow Composition.- Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction.- Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL.- Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy.- Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins.- Workflow Construction for Service-Oriented Knowledge Discovery.- Workflow Composition and Enactment Using jORCA.- A Linked Data Approach to Sharing Workflows and Workflow Results.- Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things.- Towards More Adaptive Voice Applications.- Telco Service Delivery Platforms in the Last Decade - A R&D Perspective.- Ontology-Driven Pervasive Service Composition for Everyday Life.- Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects.- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution.- Relay Placement Problem in Smart Grid Deployment.- Web Science.- Towards a Research Agenda for Enterprise Crowdsourcing.- Analyzing Collaboration in Software Development Processes through Social Networks.- A Web-Based Framework for Collaborative Innovation.- A Distributed Dynamics for WebGraph Decontamination.- Increasing Users’ Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model.- Understanding IT Organizations.- On the 2-Categorical View of Proofs.- Model Transformation and Analysis for Industrial Scale Validation.- WOMM: A Weak Operational Memory Model.- A Memory Model for Static Analysis of C Programs.- Analysing Message Sequence Graph Specifications.- OptimizeContext-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination.- A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL.- SPARDL: A Requirement Modeling Language for Periodic Control System.- AutoPA: Automatic Prototyping from Requirements.- Systematic Model-Based Safety Assessment Via Probabilistic Model Checking.- Learning Techniques for Software Verification and Validation.- Learning Techniques for Software Verification and Validation – Special Track at ISoLA 2010.- Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning.- Inferring Compact Models of Communication Protocol Entities.- Inference and Abstraction of the Biometric Passport.- From ZULU to RERS.