
000 | 01540camuu2200313 a 4500 | |
001 | 000000710966 | |
005 | 20010703142529 | |
008 | 000721s2000 maua b 100 0 eng | |
010 | ▼a 00061057 | |
020 | ▼a 0792379683 (alk. paper) | |
040 | ▼a DLC ▼c DLC ▼d UKM ▼d OHX ▼d 211009 | |
042 | ▼a pcc | |
049 | 1 | ▼l 111187827 |
050 | 0 0 | ▼a QA76.9.D5 ▼b I33845 2000 |
072 | 7 | ▼a QA ▼2 lcco |
082 | 0 0 | ▼a 004/.36 ▼2 21 |
090 | ▼a 004.36 ▼b I23f | |
111 | 2 | ▼a IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing and Verification ▼d (2000 : ▼c Pisa, Italy) |
245 | 1 0 | ▼a Formal methods for distributed system development : ▼b October 10-13, 2000, Pisa, Italy / ▼c FORTE/PSTV 2000, IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing and Verification ; edited by Tommaso Bolognesi, Diego Latella. |
260 | ▼a Boston, MA : ▼b Kluwer Academic Publishers, ▼c 2000. | |
300 | ▼a xiv, 408 p. : ▼b ill. ; ▼c 25 cm. | |
490 | 1 | ▼a IFIP ; ▼v 55 |
504 | ▼a Includes bibliographical references. | |
650 | 0 | ▼a Electronic data processing ▼x Distributed processing ▼v Congresses. |
650 | 0 | ▼a Formal methods (Computer science) ▼v Congresses. |
700 | 1 | ▼a Bolognesi, Tommaso. |
700 | 1 | ▼a Latella, Diego. |
830 | 0 | ▼a International Federation for Information Processing (Series) ; ▼v 55. |
Holdings Information
No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
---|---|---|---|---|---|---|---|
No. 1 | Location Main Library/Western Books/ | Call Number 004.36 I23f | Accession No. 111187827 | Availability Available | Due Date | Make a Reservation | Service |
Contents information
Table of Contents
Contributors. Preface. Programme Committee and Referees. Acknowledgements. Part One: Verification and Theorem Proving. 1. Formal Verification of the TTP Group Membership Algorithm; H. Pfeifer. 2. Verification of a Sliding Window Protocol Using IOA and MONA; M.A. Smith, N. Klarlund. 3. A Priori Verification of Reactive Systems; M. Majster-Cederbaum, et al. Part Two: Test Generation. 4. From Rule-based to Automata-based Testing; K. Etessami, M. Yannakakis. 5. Integrated System Interoperability Testing with Applications to VOIP; N. Griffeth, et al. 6. On Test Derivation from Partial Specifications; A. Petrenko, N. Yevtushenko. Part Three: Model Checking - Theory. 7. Compositionality for Improving Model Checking; A. Santone. 8. A Model Checking Method for Partially Symmetric Systems; S. Haddad, et al. Part Four: Model Checking - Applications. 9. Specification and Verification of Message Sequence Charts; D. Peled. 10. A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification; L. Durante, et al. 11. Verification of Consistency Protocols via Infinite-State Symbolic Model Checking; G. Delzanno. Part Five: Multicast Protocol Analysis and Simulation. 12. Systematic Performance Evaluation of Multipoint Protocols; A. Helmy, et al. 13. Simulating Multicast Transport Protocols in Estelle; J. Templemore-Finlayson, E. Borcoci. 14. Generation of Realistic Signalling Traffic in an ISDN Load Test System using SDL User Models; T. Steinert, G. Roessler. Part Six: Exhaustive and Probabilistic Testing. 15. Satisfaction up to Liveness; U. Ultes-Nitsche. 16. Testing IP Routing Protocols &endash; From Probabilistic Algorithms to a Software Tool; R. Hao, et al. Part Seven: Hardware Specification, Implementation and Testing. 17. Verifying and Testing Asynchronous Circuits using LOTOS; J. He, K.J. Turner. 18. Hardware implementation of Concurrent Periodic EFSM's; H. Katagiri, et al. 19. Modeling Distributed Embedded Systems in Multiclock ESTEREL; B. Rajan, R.K. Shyamasundar. Part Eight: Formal Semantics. 20. Compact Net Semantics for Process Algebras; M. Bernardo, et al. 21. A Concise Compositional Statecharts Semantics Definition; M. von der Beeck. 22. Implementing CCS in Maude; A. Verdejo, N. Martí-Oliet. Part Nine: Invited Papers on Verification and Security. 23. From Refutation to Verification; J. Rushby. 24. Process Algebraic Analysis of Cryptographic Protocols; M. Boreale, et al. 25. A Logic of Belief and a Model Checking Algorithm for Security Protocols; M. Benerecetti, et al.
Information Provided By: :
