By Slim Ben Lamine, John Plaice (auth.), Michael Johnson (eds.)
This booklet constitutes the refereed complaints of the sixth overseas convention on Algebraic method and software program Engineering, AMAST'97, held in Sydney, Australia, in December 1997. the quantity offers forty eight revised complete papers chosen from an strangely excessive variety of submissions. one of many amazing beneficial properties of AMAST is its mixture of critical mathematical improvement of formal tools in software program engineering with useful matters, instruments, case stories, and business improvement. the amount addresses all present elements of formal tools in software program engineering and programming technique, with a definite emphasis on algebraic and logical foundations.
Read or Download Algebraic Methodology and Software Technology: 6th International Conference, AMAST'97 Sydney, Australia, December13–17, 1997 Proceedings PDF
Best international conferences and symposiums books
This publication constitutes the refereed complaints of the seventh eu convention on Case-Based Reasoning, ECCBR 2004, held in Madrid, Spain in August/September 2004. The fifty six revised complete papers offered including an invited paper and the summary of an invited speak have been conscientiously reviewed and chosen from eighty five submissions.
This quantity comprises the complaints of the 8th Austrian synthetic Intelligence convention, held in Linz, Austria, in June 1993. the point of interest of the convention was once on "Fuzzy common sense in man made Intelligence". the quantity includes abstracts of 2 invited talks and whole types of 17 rigorously chosen papers.
This quantity of Lecture Notes in machine technological know-how includes the court cases of the rd three operating convention on part Deployment (CD 2005), which came about from 28 to 29, November 2005 in Grenoble, France, and co-located with Middleware 2005. CD 2005 is the 3rd overseas convention within the sequence, the 1st being held in Berlin and Edinburgh in 2002 and 2004, respectively.
- Discrete Geometry for Computer Imagery: 11th International Conference, DGCI 2003, Naples, Italy, November 19-21, 2003. Proceedings
- Formal Methods for Industrial Critical Systems: 12th International Workshop, FMICS 2007, Berlin, Germany, July 1-2, 2007, Revised Selected Papers
- Computers and Games: Second International Conference, CG 2000 Hamamatsu, Japan, October 26–28, 2000 Revised Papers
- Inductive Logic Programming: 8th International Conference, ILP-98 Madison, Wisconsin, USA, July 22–24, 1998 Proceedings
Extra resources for Algebraic Methodology and Software Technology: 6th International Conference, AMAST'97 Sydney, Australia, December13–17, 1997 Proceedings
Most proposals in this area deal with LTS models. However, more expressive models such as STS are needed to take data encapsulation and value passing into account. A major weakness of such models is the lack of dedicated analysis techniques. Direct mapping into standard model-checkers results in state explosion problems in the presence of unbounded data types and hence is not directly applicable. In this paper we proposed an analysis framework for STS based on conﬁguration graphs and LTS interpretations.
Finally, Section 6 draws up some concluding remarks. More details about our approach and formal deﬁnitions can be consulted in . 2 Formalising Components as Symbolic Transition Systems This section states some deﬁnitions we use thereafter to introduce our approach. First of all, we consider algebraic speciﬁcations as an abstraction of concrete implementation languages like Java, C++, or Python. A signature (or static interface) Σ is a pair (S, F ) where S is a set of sorts (type names) and F a set of function names equipped with proﬁles over these sorts.
Direct mapping into standard model-checkers results in state explosion problems in the presence of unbounded data types and hence is not directly applicable. In this paper we proposed an analysis framework for STS based on conﬁguration graphs and LTS interpretations. This enables one to use the usual veriﬁcation techniques on these LTS.