Results 281 to 290 of about 1,494,052 (317)
Some of the next articles are maybe not open access.
Formal Methods for Mobile Robots
2019Most existing work in the literature typically ensures the correctness of mobile robot protocols via ad hoc handwritten proofs, which are both cumbersome and error-prone.
Potop-Butucaru, Maria+3 more
openaire +2 more sources
Formal Methods for Web Services
2009The volume presents the set of papers accompanying the lectures of the 9th International School on Formal Methods for the Design of Computer, Communication and Software Systems (SFM). Luca Padovani served as co-director of the school (whence his role as editor of this volume) as well as one of the lecturers.
M. BERNARDO, L. PADOVANI, G. ZAVATTARO
openaire +1 more source
1989
The discussion in the preceding chapters, in particular spectral perturbation theory, was of a mathematically rigorous character. Unfortunately, many systems of the real world involve perturbations which do no fit within the framework of Chapter V. Typically, this occurs in boundary value problems involving a differential equation with a coefficient e ...
J. Sanchez Hubert, E. Sanchez Palencia
openaire +2 more sources
The discussion in the preceding chapters, in particular spectral perturbation theory, was of a mathematically rigorous character. Unfortunately, many systems of the real world involve perturbations which do no fit within the framework of Chapter V. Typically, this occurs in boundary value problems involving a differential equation with a coefficient e ...
J. Sanchez Hubert, E. Sanchez Palencia
openaire +2 more sources
2009
Privacy means something different to everyone. Against a vast and rich canvas of diverse types of privacy rights and violations, we argue technology's dual role in privacy: new technologies raise new threats to privacy rights and new technologies can help preserve privacy.
Michael Carl Tschantz, Jeannette M. Wing
openaire +2 more sources
Privacy means something different to everyone. Against a vast and rich canvas of diverse types of privacy rights and violations, we argue technology's dual role in privacy: new technologies raise new threats to privacy rights and new technologies can help preserve privacy.
Michael Carl Tschantz, Jeannette M. Wing
openaire +2 more sources
Formal Methods Panel: Are Formal Methods Ready for Dependable Systems?
1995Formal specification and verification techniques have been advocated for life-critical applications for over two decades but have only been applied to a few deployed systems. Nevertheless, formal methods have been successfully used on increasingly difficult research problems over the last 5–10 years.
openaire +2 more sources
2001
Formal methods have offered great benefits, but often at a heavy price. For everyday software development, in which the pressures of the market don't allow full-scale formal methods to be applied, a more lightweight approach is called for. I'll outline an approach that is designed to provide immediate benefit at relatively low cost.
openaire +1 more source
Formal methods have offered great benefits, but often at a heavy price. For everyday software development, in which the pressures of the market don't allow full-scale formal methods to be applied, a more lightweight approach is called for. I'll outline an approach that is designed to provide immediate benefit at relatively low cost.
openaire +1 more source
2001
Abstract: "A formal method is a mathematically-based technique used in Computer Science to describe properties of hardware and/or software systems. It provides a framework within which large, complex systems may be specified, developed, and verified in a systematic rather than ad hoc manner.
openaire +1 more source
Abstract: "A formal method is a mathematically-based technique used in Computer Science to describe properties of hardware and/or software systems. It provides a framework within which large, complex systems may be specified, developed, and verified in a systematic rather than ad hoc manner.
openaire +1 more source
1991
From the early 1970s conventional digital and analogue electronic systems have gradually been superseded by microprocessor-based designs. Subsequent experience shows that their reliability rarely exceeded that of earlier designs, due mainly to software errors. The root cause was the lack of design formality and rigour in producing software.
openaire +2 more sources
From the early 1970s conventional digital and analogue electronic systems have gradually been superseded by microprocessor-based designs. Subsequent experience shows that their reliability rarely exceeded that of earlier designs, due mainly to software errors. The root cause was the lack of design formality and rigour in producing software.
openaire +2 more sources