Safe combinations of services using B
暂无分享,去创建一个
[1] Jean-Raymond Abrial,et al. The B-book - assigning programs to meanings , 1996 .
[2] Babak Dehbonei,et al. Error-free software development for critical systems using the B-Methodology , 1992, [1992] Proceedings Third International Symposium on Software Reliability Engineering.
[3] Jean-Pierre Verjus. On the Proof of a Distributed Algorithm , 1987, Inf. Process. Lett..
[4] A. J. M. van Gasteren,et al. Comments on "On the Proof of a Distributed Algorithm": Always-Tru is not Invariant , 1990, Inf. Process. Lett..
[5] M. Crowther,et al. Feature interaction detection using SDL models , 1994, 1994 IEEE GLOBECOM. Communications: The Global Bridge.
[6] H. Velthuijsen,et al. Feature interactions in telecommunications systems , 1993, IEEE Communications Magazine.
[7] C. A. R. Hoare,et al. An axiomatic basis for computer programming , 1969, CACM.
[8] Jeremy Dick,et al. Applying the B Technologies on CICS , 1996, FME.
[9] Bengt Jonsson,et al. Using temporal logic for modular specification of telephone services , 1994, FIW.
[10] Jens E. Kristensen,et al. Interaction detection, a logical approach , 1994, FIW.
[11] Leslie Lamport,et al. The temporal logic of actions , 1994, TOPL.
[12] Robert W. Floyd,et al. Assigning Meanings to Programs , 1993 .
[13] Simon Pickin,et al. Formalisation of a user view of network and services for feature interaction detection , 1994, FIW.