Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3576
Editat de Kousha Etessami, Sriram K. Rajamanien Limba Engleză Paperback – 24 iun 2005
Din seria Lecture Notes in Computer Science
- 20% Preț: 1021.30 lei
- 20% Preț: 337.03 lei
- 20% Preț: 340.22 lei
- 20% Preț: 256.27 lei
- 20% Preț: 324.32 lei
- 20% Preț: 438.69 lei
- 20% Preț: 315.78 lei
- 20% Preț: 327.52 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 557.41 lei
- 20% Preț: 561.37 lei
- 15% Preț: 558.56 lei
- 20% Preț: 238.01 lei
- 20% Preț: 504.57 lei
- 20% Preț: 329.09 lei
- 20% Preț: 563.75 lei
- 20% Preț: 630.24 lei
- 20% Preț: 321.96 lei
- 20% Preț: 1361.10 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.39 lei
- Preț: 366.90 lei
- 20% Preț: 172.69 lei
- 20% Preț: 315.19 lei
- 20% Preț: 985.59 lei
- 20% Preț: 620.87 lei
- 20% Preț: 436.22 lei
- 20% Preț: 734.34 lei
- 20% Preț: 1034.49 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 573.92 lei
- 20% Preț: 301.95 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 327.52 lei
- 20% Preț: 794.65 lei
- 20% Preț: 569.16 lei
- Preț: 395.43 lei
- 20% Preț: 1138.26 lei
- 20% Preț: 734.34 lei
- 20% Preț: 315.78 lei
- 20% Preț: 330.70 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.98 lei
Preț: 634.85 lei
Preț vechi: 793.57 lei
-20% Nou
Puncte Express: 952
Preț estimativ în valută:
121.50€ • 128.18$ • 101.25£
121.50€ • 128.18$ • 101.25£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540272311
ISBN-10: 3540272313
Pagini: 588
Ilustrații: XVI, 568 p.
Dimensiuni: 155 x 235 x 31 mm
Greutate: 0.81 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Theoretical Computer Science and General Issues
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540272313
Pagini: 588
Ilustrații: XVI, 568 p.
Dimensiuni: 155 x 235 x 31 mm
Greutate: 0.81 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Theoretical Computer Science and General Issues
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Randomized Algorithms for Program Analysis and Verification.- Validating a Modern Microprocessor.- Algorithmic Algebraic Model Checking I: Challenges from Systems Biology.- Tools Competition.- SMT-COMP: Satisfiability Modulo Theories Competition.- Abstraction and Refinement.- Predicate Abstraction via Symbolic Decision Procedures.- Interpolant-Based Transition Relation Approximation.- Concrete Model Checking with Abstract Matching and Refinement.- Abstraction for Falsification.- Bounded Model Checking.- Bounded Model Checking of Concurrent Programs.- Incremental and Complete Bounded Model Checking for Full PLTL.- Abstraction Refinement for Bounded Model Checking.- Symmetry Reduction in SAT-Based Model Checking.- Tool Papers I.- Saturn: A SAT-Based Tool for Bug Detection.- JVer: A Java Verifier.- Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework.- Wolf – Bug Hunter for Concurrent Software Using Formal Methods.- Model Checking x86 Executables with CodeSurfer/x86 and WPDS++.- The ComFoRT Reasoning Framework.- Verification of Hardware, Microcode, and Synchronous Systems.- Formal Verification of Pentium ® 4 Components with Symbolic Simulation and Inductive Invariants.- Formal Verification of Backward Compatibility of Microcode.- Compositional Analysis of Floating-Point Linear Numerical Filters.- Syntax-Driven Reachable State Space Construction of Synchronous Reactive Programs.- Games and Probabilistic Verification.- Program Repair as a Game.- Improved Probabilistic Models for 802.11 Protocol Verification.- Probabilistic Verification for “Black-Box” Systems.- On Statistical Model Checking of Stochastic Systems.- Tool Papers II.- The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.- The Orchids Intrusion Detection Tool.- TVOC: A Translation Validator for Optimizing Compilers.- Cogent: Accurate Theorem Proving for Program Verification.- F-Soft: Software Verification Platform.- Decision Procedures and Applications.- Yet Another Decision Procedure for Equality Logic.- DPLL(T) with Exhaustive Theory Propagation and Its Application to Difference Logic.- Efficient Satisfiability Modulo Theories via Delayed Theory Combination.- Automata and Transition Systems.- Symbolic Systems, Explicit Properties: On Hybrid Approaches for LTL Symbolic Model Checking.- Efficient Monitoring of ?-Languages.- Verification of Tree Updates for Optimization.- Expand, Enlarge and Check... Made Efficient.- Tool Papers III.- IIV: An Invisible Invariant Verifier.- Action Language Verifier, Extended.- Romeo: A Tool for Analyzing Time Petri Nets.- TRANSYT:A Tool for the Verification of Asynchronous Concurrent Systems.- Ymer: A Statistical Model Checker.- Program Analysis and Verification I.- Extended Weighted Pushdown Systems.- Incremental Algorithms for Inter-procedural Analysis of Safety Properties.- A Policy Iteration Algorithm for Computing Fixed Points in Static Analysis of Programs.-Program Analysis and Verification II.- Data Structure Specifications via Local Equality Axioms.- Linear Ranking with Reachability.- Reasoning About Threads Communicating via Locks.- Applications of Learning.- Abstraction Refinement via Inductive Learning.- Automated Assume-Guarantee Reasoning for Simulation Conformance.- Symbolic Compositional Verification by Learning Assumptions.