Engineering Trustworthy Software Systems [electronic resource] : First International School, SETSS 2014, Chongqing, China, September 8-13, 2014. Tutorial Lectures / edited by Zhiming Liu, Zili Zhang.
Contributor(s): Liu, Zhiming [editor.] | Zhang, Zili [editor.] | SpringerLink (Online service).
Material type: BookSeries: Lecture Notes in Computer Science: 9506Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016.Description: XI, 325 p. 141 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319296289.Subject(s): Computer science | Special purpose computers | Software engineering | Programming languages (Electronic computers) | Computer logic | Computer simulation | Computer Science | Software Engineering | Logics and Meanings of Programs | Programming Languages, Compilers, Interpreters | Simulation and Modeling | Special Purpose and Application-Based SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.1 Online resources: Click here to access online(In-)formal methods: The Lost Art -- Program refinement, perfect secrecy and information flow -- The Z Notation: Whence the Cause and Whither the Course? -- Model-Driven Design of Object and Component Systems -- Cyber-Physical Systems Engineering -- Combining Formal and Informal Methods in the Design of Spacecrafts.
The courses of SETSS 2014 aim to improve the understanding of the relation between theory and practice in software engineering, to contribute to narrowing the gap between them. This volume contains the lecture notes of the five courses and materials of one seminar. The common themes of the courses include the design and use of theories, techniques and tools for software specification and modeling, analysis and verification. The courses cover sequential programming, component- and object software, hybrid systems and cyber-physical systems with challenges of termination, security, safety, security, fault-tolerance and real-time requirements. The techniques include model checking, correctness by construction through refinement and model transformations, synthesis and computer algebra.
There are no comments for this item.