Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
3,345
result(s) for
"Computer software -- Verification"
Sort by:
Principles of model checking
by
Katoen, Joost-Pieter
,
Baier, Christel
in
Computer software
,
Computer software -- Verification
,
Computer systems
2008
A comprehensive introduction to the foundations of model checking, a fully automated technique for finding flaws in hardware and software; with extensive examples and both practical and theoretical exercises.
Dependable Software Systems Engineering
2015
We are all increasingly dependent on software systems to run the technology we use every day, so we need these systems to be both reliable and safe.This book presents papers from the NATO Advanced Study Institute Summer School Dependable Software Systems Engineering, held in Marktoberdorf, Germany, in July and August 2014. Lecturers were drawn from prestigious research groups representing both industry and academia, and the course was designed as an in-depth presentation and teaching of state-of-the-art scientific techniques and methods covering research and industrial practice as well as scientific principles.Topics covered
Metamodeling-Driven IP Reuse for SoC Integration and Microprocessor Design
by
Mathaikutty, Deepak A
,
Shukla, Sandeep
in
Computer software
,
Design and construction
,
Intellectual property
2009
This cutting-edge resource offers you an in-depth understanding of metamodeling approaches for the reuse of intellectual properties (IPs) in the form of reusable design or verification components. The books covers the essential issues associated with fast and effective integration of reusable design components into a system-on-a-chip (SoC) to achieve faster design turn-around time. Moreover, it addresses key factors related to the use of reusable verification IPs for a \"write once, use many times\" verification strategy - another effective approach that can attain a faster product design cycle.
Verification of Infinite-State Systems with Applications to Security
by
Clarke, E
,
Minea, M
,
Ţiplea, F. L
in
Computer security-Congresses
,
Computer software-Verification-Congresses
,
System theory-Mathematical models-Congresses
2006
The recent years have brought a number of advances in the development of infinite state verification, using techniques such as symbolic or parameterized representations, symmetry reductions, abstractions, constraint-based approaches, combinations of model checking and theorem proving. The active state of research on this topic provides a good time-point to increase impact by bringing together leading scientists and practitioners from these individual approaches. This volume gives an overview of the current research directions and provides information for researchers interested in the development of mathematical techniques for the analysis of infinite state systems.
Software safety and security : tools for analysis and verification
by
Nipkow, Tobias
,
Grumberg, Orna
,
Hauptmann, Benedikt
in
Computer security-Congresses
,
Computer software-Verification-Congresses
2012
Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was divided into three integrated modules: Foundations of Safety and Security, Applications of Safety Analysis and Security Analysis. Subjects covered include mechanized game-based proofs of security protocols, formal security proofs, model checking, using and building an automatic program verifier and a hands-on introduction to interactive proofs.Bringing together many leading international experts in the field, this NATO Advanced Study Institute once more proved invaluable in facilitating the connections which will influence the quality of future research and the potential to transfer research into practice. This book will be of interest to all those whose work depends on the safety and security of software systems.
Software and Systems Safety
2011
Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs.This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance.
Formal Methods for Safety and Security
by
Nanda, Manju
,
Jeppu, Yogananda
in
Aerospace Technology and Astronautics
,
Calculus of Variations and Optimal Control; Optimization
,
Engineering
2017
This volume is the outcome of deliberations on formal methods in aerospace. The book specially delves into the use of formal methods for verification, validation, and optimization of software in safety critical and time critical applications, such as those in aerospace engineering.