Comparing Specification Paradigms: Gypsy and Z
暂无分享,去创建一个
[1] C. A. R. Hoare,et al. The emperor's old clothes , 1981, CACM.
[2] Bernard Sufrin. Towards a formal specification of the ICL data dictionary , 1984 .
[3] Donald I. Good,et al. General Message Flow Modulator , 1984 .
[4] John McHugh,et al. Coding for a Believable Specification to Implementation Mapping , 1987, 1987 IEEE Symposium on Security and Privacy.
[5] Niklaus Wirth,et al. Pascal User Manual and Report , 1991, Springer New York.
[6] Robert S. Boyer,et al. A verified code generator for a subset of gypsy , 1988 .
[7] Carroll Morgan,et al. Specification of the UNIX Filing System , 1984, IEEE Transactions on Software Engineering.
[8] Ib Sørensen,et al. CAVIAR: a case study in specification , 1987 .
[9] Ian J. Hayes,et al. Specification case studies , 1987 .
[10] Carl E. Landwehr. The Best Available Technologies for Computer Security , 1983, Computer.
[11] J. Michael Spivey,et al. Understanding Z : A specification language and its formal semantics , 1985, Cambridge tracts in theoretical computer science.
[12] Magebula. The two languages , 1955 .
[13] Jock D. Mackinlay,et al. Expressiveness of Languages , 1984, AAAI.
[14] Donald I. Good,et al. A verified encrypted packet interface , 1981, SOEN.
[15] Jonathan K. Millen,et al. Verifying Security , 1981, CSUR.
[16] William D. Young,et al. Secure Ada Target: Issues, System Design, and Verification , 1985, 1985 IEEE Symposium on Security and Privacy.
[17] Conclusions , 1989 .
[18] Cliff B. Jones,et al. Tentative steps toward a development method for interfering programs , 1983, TOPL.