Formal Techniques for Networked and Distributed Systems - FORTE 2008 (eBook, PDF)
62,95 €
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
Versandkostenfrei*
31 °P sammeln
62,95 €
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
Versandkostenfrei*

Alle Infos zum eBook verschenken
31 °P sammeln
Als Download kaufen
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
31 °P sammeln
Jetzt verschenken
62,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
31 °P sammeln
  • Format: PDF


This volume contains the proceedings of FORTE 2008, 28th IFIP WG6.1 - ternational Conference on Formal Techniques for Networked and Distributed Systems. FORTE 2008 was held at the Campus Innovation Center in Tokyo, Japan during June 10-13, 2008. FORTE denotes a series of international wo- ing conferences on formal description techniques applied to computer networks and distributed systems. The conference series started in 1981 under the name PSTV. In 1988 a second series under the name FORTE was set up. Both - ries were united to FORTE/PSTV in 1996. In 2001 the conference changed the name to…mehr

Produktbeschreibung
This volume contains the proceedings of FORTE 2008, 28th IFIP WG6.1 - ternational Conference on Formal Techniques for Networked and Distributed Systems. FORTE 2008 was held at the Campus Innovation Center in Tokyo, Japan during June 10-13, 2008. FORTE denotes a series of international wo- ing conferences on formal description techniques applied to computer networks and distributed systems. The conference series started in 1981 under the name PSTV. In 1988 a second series under the name FORTE was set up. Both - ries were united to FORTE/PSTV in 1996. In 2001 the conference changed the name to its current form. Recent conferences of this long series were held in Berlin (2003), Madrid(2004), Taipei(2005), Paris(2006), and Tallinn(2007). As in the previous year, FORTE 2008 was collocated with TESTCOM/ FATES 2008: the 20th IFIP International Conference on Testing of Com- nicating Systems (TESTCOM) and the 8th International Workshop on Formal Approaches to Testing of Software (FATES). The co-location of FORTE and TESTCOM/FATES fostered the collaboration between their communities. The commonspiritofboth conferenceswasunderpinnedby jointopening andclosing sessions, invited talks, as well as joint social events.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

  • Produktdetails
  • Verlag: Springer-Verlag GmbH
  • Seitenzahl: 344
  • Erscheinungstermin: 1. Juni 2008
  • Englisch
  • ISBN-13: 9783540688556
  • Artikelnr.: 44131693
Inhaltsangabe
Invited Talk.- Model Generation for Horn Logic with Stratified Negation.- Abstraction.- Counterexample Guided Spotlight Abstraction Refinement.- An Experimental Evaluation of Probabilistic Simulation.- An SMT Approach to Bounded Reachability Analysis of Model Programs.- Verification.- Parameterized Tree Systems.- Adapting Petri Nets Reductions to Promela Specifications.- Verification of a Hierarchical Generic Mutual Exclusion Algorithm.- Specification Framework I.- Distributed Semantics and Implementation for Systems with Interaction and Priority.- Checking Correctness of Transactional Behaviors.- Specifying and Verifying Web Transactions.- Application.- Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri Nets.- Program Repair Suggestions from Graphical State-Transition Specifications.- Verifying Erlang Telecommunication Systems with the Process Algebra ?CRL.- Specification Framework II.- NQSL - Formal Language and Tool Support for Network Quality-of-Service Requirements.- Timed Mobile Ambients for Network Protocols.- A Specification Framework for Earth-Friendly Logistics.- Theory.- A Hierarchy of Equivalences for Probabilistic Processes.- Multiset Bisimulations as a Common Framework for Ordinary and Probabilistic Bisimulations.- Reliability of Networked Systems.- Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning.- Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol.- Protocol Modeling with Model Program Composition.