Experiences in the Industrial use of Formal Methods
暂无分享,去创建一个
[1] J. Michael Spivey,et al. The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.
[2] Jan Trobitius,et al. Anwendung der "Common Criteria for Information Technology Security Evaluation" (CC) / ISO 15408 auf ein SOA Registry-Repository , 2007, Informatiktage.
[3] Anthony Hall,et al. Integrating Z into Large Projects Tools and Techniques , 2008, ABZ.
[4] John G. P. Barnes,et al. High Integrity Software - The SPARK Approach to Safety and Security , 2003 .
[5] Anthony Hall,et al. Seven myths of formal methods , 1990, IEEE Software.
[6] 오준석,et al. Correctness by Construction 을 적용한 안전필수 시스템 개발 , 2009 .
[7] Anthony Hall,et al. Will It Work , 2001 .
[8] Yannick Moy,et al. Tokeneer: Beyond Formal Program Verification , 2010 .
[9] Anthony Hall. Using Formal Methods to Develop an ATC Information System , 1996, IEEE Softw..
[10] Jim Woodcock,et al. The Tokeneer Experiments , 2010, Reflections on the Work of C. A. R. Hoare.
[11] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[12] HallAnthony,et al. Correctness by Construction , 2002 .
[13] Steve King,et al. Is Proof More Cost-Effective Than Testing? , 2000, IEEE Trans. Software Eng..
[14] Anthony Hall,et al. Correctness by Construction: Developing a Commercial Secure System , 2002, IEEE Softw..