Software Verification: Infinite-State Model Checking and Static Program
|
|
|
- Annice Blankenship
- 10 years ago
- Views:
Transcription
1 Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet, Sweden 2 LIAFA Université Paris VII, France 3 Westfälische Wilhelms-Universität Münster, Germany Abstract. This is the executive summary of Dagstuhl Seminar 06081, Software Verification: Infinite-State Model Checking and Static Program Analysis. The seminar was held from February 19 to February 24, 2006, at the International Conference and Research Center for Computer Science Schloss Dagstuhl, Germany. 1 Introduction Software systems are present at the very heart of many daily-life applications, such as in communication (telephony and mobile Internet), transportation, energy, health, etc. Such systems are often critical in the sense that their failure can have considerable human or economical consequences. Therefore, there is a real need of rigorous and automated methods for software development which guarantee a high level of reliability. It is well-known that, to ensure reliability, development methods must include algorithmic analysis and verification techniques which allow (1) automatic detection of defective system behavior and (2) automatic correctness analysis of systems with respect to their specifications. For modern software systems, many complex aspects are of crucial importance such as manipulation of data over unbounded domains (integers, reals, etc.), object-orientation, dynamic memory structures (creation of objects, pointer manipulation), dynamic control (multi-threading, procedure calls), synchronization between concurrent processes, parameterization, real-time and hybrid modeling, etc. The development of software analysis and verification methods and tools allowing to deal efficiently with such aspects constitutes a major scientific and technological challenge. Two important and quite active research communities are particularly concerned with this challenge: the community of computeraided verification, especially the community of (infinite-state) model checking, and the community of static program analysis. The two communities are adopting different approaches: The model-checking community studies complete methods for the verification/analysis of abstract models. These abstract models may involve infinity features such as those mentioned above. On the other hand, the Dagstuhl Seminar Proceedings Software Verification: Infinite-State Model Checking and Static Program Analysis
2 program analysis community works with approximate analyses applied on formalisms that are closer to programming languages and specification formalisms used in practice. While the approaches and the developed techniques are different, the two communities share a common mathematical background and their methods are based on common basic concepts and principles: transition systems and automatabased models, abstractions, fixpoint computations, reachability analysis based on symbolic representation structures of (potentially infinite) sets of configurations, etc. 2 Dagstuhl Seminar Dagstuhl Seminar Software Verification: Infinite-State Verification and Static Program Analysis brought together 51 researchers from these two communities in order to (1) improve and deepen the mutual understanding of the developed technologies, (2) compare these technologies and identify complementary aspects, and (3) trigger collaborations leading to new developments. The seminar was held from February 19 to February 24, 2006, at the International Conference and Research Center for Computer Science Schloss Dagstuhl, Germany. The participants came from 12 countries, mainly from Europe and the US. More specifically, 1 participant came from Austria, 2 from Belgium, 1 from The Czech Republic, 1 from Denmark, 12 from France, 12 from Germany, 3 from Israel, 1 from Italy, 1 from Russia, 2 from Switzerland, 5 from the United Kingdom, and 10 from the United States. In 31 talks, the participants presented results of their recent research. These talks touched many issues of automatic software verification including: abstraction techniques, invariant generation, termination analysis, automata-based representation structures and applications of regular model checking, analysis of pointer and heap structures, timed and hybrid systems, multi-threaded programs, parameterized systems, probabilistic models and verification methods, etc. In a final session on Friday morning, the participants discussed how to progress further in the field of automatic software verification and how to get the developed technology to practice. Lack of common benchmarks and notations and a tendency to evaluate techniques on academic toy examples rather than on real code (e.g., from Java libraries) were identified as obstacles to fair comparison of different analyses and broader dissemination of the results. Reasons for this are that the area is quite broad with many different aspects, and that some of the techniques are still in an experimental stage. During the evenings and nights, the great facilities of Dagstuhl offered plenty of opportunities to enjoy other pleasures besides science, among them beer, cheese, and music (in alphabetical order). On Wednesday afternoon there was an opportunity to join an excursion to Luxembourg city. 2
3 3 Main Results and Approaches This section summarizes briefly some of the main results and approaches which have been presented at the seminar. Abstraction techniques. A lot of effort is devoted to automated data abstraction methods, following the idea to combine predicate abstraction with counterexample guided abstraction refinement (CEGAR). One of the main issues in this context is to provide powerful and scalable techniques for automatic detection of abstractions which are sufficiently accurate for the given property. Recent developments on this topic are based on using the notion of interpolants. Another important issue is to adapt these techniques to programs with complex control features such as procedure calls and multi-threading. Recent results propose the extension of the CEGAR framework to such programs using abstract model-checking techniques for communicating pushdown systems. Abstraction techniques can also be used in order to enforce termination of symbolic reachability analysis. Instead of checking a property on an abstract model (which is the approach generally adopted in the model-checking community), it is possible to introduce abstraction in the analysis by considering approximate successor computations (which is usually the approach followed in the abstract interpretation community). Recent work tries to define such abstract analysis algorithms which are complete for significant classes of models (i.e., they can decide for these models whether some reachability property holds or not). Interesting results have been obtained concerning complete forward reachability analysis algorithms for the class of well-structured systems (such as Petri nets and lossy channel systems). Automata-based techniques. Finite-state (word/tree) automata can represent potentially infinite (regular) sets of (encodings of) system configurations. These representations can be used in the computation of reachability sets (or approximations of these sets) for the given system (when each operation of the system is modeled as a transformation on the word/tree encodings of the configurations). Techniques such as meta-transition based (or transitive closure based) acceleration, widening, or (finite range) abstraction are used in order to ensure the termination of the analysis. This approach (more and more known under the name of regular model checking ) has been adopted for dealing with various classes of systems such as counter systems (using binary encodings of integers), pushdown systems, FIFO channel systems, parameterized networks of processes, and more recently, systems with dynamic linked structures (such as lists, doubly linked lists, trees, etc). Pointer and heap structure analysis. Reasoning about programs with pointers and dynamic management of the memory is one of the most challenging issues in software verification. A lot of effort is devoted to finding powerful and scalable methods and techniques dealing with significant classes of such programs. 3
4 Several of these works concentrate on the case of programs with lists (with possibility of sharing and cyclicality). Among these works there are approaches based on (1) logics such as fragments of separation logic or the first-order theory of Boolean algebra of sets, (2) word abstract regular model checking, (3) translations to counter automata (where counters allow to reason about the lengths of the lists), (4) instrumentation of programs, etc. Other works provide approaches and frameworks for dealing with more general classes of programs based on (1) logics such as separation logic or fragments of first-order logic on graphs with reachability predicates, (2) tree abstract regular model checking, (3) graph rewriting, etc. Few other works propose techniques allowing to reason on both the shapes of the dynamic linked structures and on the data they carry (i.e., the values in the data fields in each object of the structure). Termination analysis. Several groups are developing approaches for automatic verification of program termination. One of the approaches is based on checking the existence of a decreasing ranking function. Recent developments concern the reduction of this problem to an arithmetical decision problem. Another interesting approach is based on checking the existence of a finite union of well-founded relations covering the transitive closure of the transition relation of the program. Recent work concerning this approach proposes systematic techniques for discovering such well-founded relations iteratively using a counterexample guided principle. More specific approaches have been developed for dealing with programs with lists. By including information on the length of the lists in the program models, it is possible to reduce the termination problem of such programs to the termination analysis of programs with counters. The latter problem can be solved using the techniques mentioned earlier. Probabilistic models. Recent research directions consider the verification problem of probabilistic (infinite-state) models of programs. Impressive new decidability results have been obtained recently concerning probabilistic pushdown systems and probabilistic lossy channel systems. Also decidability of equivalence and refinement checking of probabilistic programs have been studied. Parametric verification. Parametric verification intends to verify systems comprising a network of an arbitrary number of identical or similar components running concurrently. Typical examples of such systems are mutual exclusion, cache coherence, and broadcast protocols. Recent work in this area is concerned with inferring invariants of such networks automatically. Another technique uses abstraction: it views the network from the perspective of one component and abstracts the other components by a combination of predicate and counter abstraction. 4
5 Timed systems. In the area of timed systems, recent decidability results about metric temporal logics and dense-time Petri nets were presented at the seminar. Although the details are quite different, a recurring idea is to reduce the problem to a problem about an untimed or discrete model for which decidability is wellunderstood, e.g., using the theory of well-structured systems based on the notion of well-quasi orderings. Acknowledgments As the organizers we wish to thank the staff of the Dagstuhl office in Saarbrücken and at Schloss Dagstuhl itself for their great support in organizing and running the seminar. We also would like to thank all the participants of the seminar for their talks and their expertise that made the seminar such a fruitful research venue. 5
Model Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
Formal Verification of Software
Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification
The Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
µz An Efficient Engine for Fixed points with Constraints
µz An Efficient Engine for Fixed points with Constraints Kryštof Hoder, Nikolaj Bjørner, and Leonardo de Moura Manchester University and Microsoft Research Abstract. The µz tool is a scalable, efficient
T-79.186 Reactive Systems: Introduction and Finite State Automata
T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software
Introduction to Static Analysis for Assurance
Introduction to Static Analysis for Assurance John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby Static Analysis for Assurance: 1 Overview What is static analysis?
University of Dayton Department of Computer Science Undergraduate Programs Assessment Plan DRAFT September 14, 2011
University of Dayton Department of Computer Science Undergraduate Programs Assessment Plan DRAFT September 14, 2011 Department Mission The Department of Computer Science in the College of Arts and Sciences
The Course. http://www.cse.unsw.edu.au/~cs3153/
The Course http://www.cse.unsw.edu.au/~cs3153/ Lecturers Dr Peter Höfner NICTA L5 building Prof Rob van Glabbeek NICTA L5 building Dr Ralf Huuck NICTA ATP building 2 Plan/Schedule (1) Where and When Tuesday,
A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
INF5140: Specification and Verification of Parallel Systems
Motivation INF5140: Specification and Verification of Parallel Systems Lecture 1 Introduction: Formal Methods Gerardo Schneider Department of Informatics University of Oslo INF5140, Spring 2009 Outline
Division of Mathematical Sciences
Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
Model Checking of Software
Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving
InvGen: An Efficient Invariant Generator
InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic
logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?
5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
School of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
Formal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
Report on the Dagstuhl Seminar Data Quality on the Web
Report on the Dagstuhl Seminar Data Quality on the Web Michael Gertz M. Tamer Özsu Gunter Saake Kai-Uwe Sattler U of California at Davis, U.S.A. U of Waterloo, Canada U of Magdeburg, Germany TU Ilmenau,
Automated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
EXECUTIVE SUMMARY. Measuring money laundering at continental level: The first steps towards a European ambition. January 2011 EUROPEAN COMMISSION
MONEY LAUNDERING IN EUROPE Measuring money laundering at continental level: The first steps towards a European ambition EXECUTIVE SUMMARY January 2011 EUROPEAN COMMISSION DG HOME AFFAIRS FIGHT AGAINST
Software Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
Model Checking based Software Verification
Model Checking based Software Verification 18.5-2006 Keijo Heljanko [email protected] Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24
Datavetenskapligt Program (kandidat) Computer Science Programme (master)
Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer
How To Understand Programmatic Advertising
Attitudes towards Programmatic Advertising August 2015 @IABEurope IAB Europe iabeurope.eu IAB Europe Page 1 of17 Contents 1. Introduction 3-4 2. Executive Summary 5 3. Methodology and Participants 6 4.
BEST PRACTICES/ TRENDS/ TO-DOS
Online Insurance Europe: S/ TRENDS/ TO-DOS New success guidelines WHAT TO DO N D E EW IO IT N Your Benefits EUROPE S S/ TRENDS/ TO-DOS: The new and only study about the best online insurance solutions
Introducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
PRINCIPLES FOR EVALUATION OF DEVELOPMENT ASSISTANCE
PRINCIPLES FOR EVALUATION OF DEVELOPMENT ASSISTANCE DEVELOPMENT ASSISTANCE COMMITTEE PARIS, 1991 DAC Principles for Evaluation of Development Assistance Development Assistance Committee Abstract: The following
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems 29 August 2011 What are workflows to us? Plans or schedules that map users or resources to tasks Such mappings may
Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries
First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
The ProB Animator and Model Checker for B
The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
Monitoring Metric First-order Temporal Properties
Monitoring Metric First-order Temporal Properties DAVID BASIN, FELIX KLAEDTKE, SAMUEL MÜLLER, and EUGEN ZĂLINESCU, ETH Zurich Runtime monitoring is a general approach to verifying system properties at
VDM vs. Programming Language Extensions or their Integration
VDM vs. Programming Language Extensions or their Integration Alexander A. Koptelov and Alexander K. Petrenko Institute for System Programming of Russian Academy of Sciences (ISPRAS), B. Communisticheskaya,
Time-Correlated Multi-domain RF Analysis with the MSO70000 Series Oscilloscope and SignalVu Software
Time-Correlated Multi-domain RF Analysis with the MSO70000 Series Oscilloscope and SignalVu Software Technical Brief Introduction The MSO70000 Series Mixed Oscilloscope, when coupled with SignalVu Spectrum
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Please note! This is a preliminary list of courses for the study year 2016/2017. Changes may occur! AUTUMN 2016 BACHELOR COURSES DIP217 Applied Software
Brno University of Technology. PhD. Thesis. Symbolic Data Structures for Parametric Verification
Brno University of Technology Faculty of Information Technology PhD. Thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Symbolic Data Structures for Parametric
Automata-based Verification - I
CS3172: Advanced Algorithms Automata-based Verification - I Howard Barringer Room KB2.20: email: [email protected] March 2006 Supporting and Background Material Copies of key slides (already
European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS
European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute
Modeling, Verification and Testing using Timed and Hybrid. Automata. Stavros Tripakis and Thao Dang
Modeling, Verification and Testing using Timed and Hybrid Automata Stavros Tripakis and Thao Dang September 12, 2008 ii Contents 1 Modeling, Verification and Testing using Timed and Hybrid Automata 1 1.1
Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy
Dept. of Computer Science Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Matteo Camilli [email protected] http://camilli.di.unimi.it ICSE 2014 Hyderabad, India June 3,
Winter 2016 Course Timetable. Legend: TIME: M = Monday T = Tuesday W = Wednesday R = Thursday F = Friday BREATH: M = Methodology: RA = Research Area
Winter 2016 Course Timetable Legend: TIME: M = Monday T = Tuesday W = Wednesday R = Thursday F = Friday BREATH: M = Methodology: RA = Research Area Please note: Times listed in parentheses refer to the
and technology engineered for agile business
IFS Applications architecture and technology engineered for agile business OUR SOLUTION S DNA When we first set out to create IFS Applications over 25 years ago, our goal was to make the most usable business
Formal Verification and Linear-time Model Checking
Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging
How To Develop A Static Analysis System For Large Programs
Towards the Industrial Scale Development of Custom Static Analyzers John Anton, Eric Bush, Allen Goldberg, Klaus Havelund, Doug Smith, Arnaud Venet Kestrel Technology LLC 4984 El Camino Real #230 Los Altos,
TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.
CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express
System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems
System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
White paper. Selecting Field Service Management Software
White paper Selecting Field Service Management Software Content What is a Dynamic Scheduling Engine (DSE) and IFS 360 Scheduling?... 1 A case in point... 3 Importance of the cloud... 5 Integration with
Access the world. with Schwab Global Investing Services
Access the world with Schwab Global Investing Services 78% of developed country equity market growth between 2000 and 2012 came from outside the U.S. 1 60% of developed country stock market capitalization
6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008
MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
Regular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
PhD Education in Educational Sciences in Finland: Systematic Development of the Programmes
PhD Education in Educational Sciences in Finland: Systematic Development of the Programmes Jari Lavonen Department of Teacher Education, University of Helsinki, Finland Käyttäytymistieteellinen tiedekunta
Information Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)
S Information Technology Security Evaluation Criteria ITSEC Joint Interpretation Library (ITSEC JIL) Version 2.0 November 1998 This document is paginated from i to vi and from 1 to 65 ITSEC Joint Interpretation
MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES FIELD 050: COMPUTER SCIENCE
MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES Subarea Educational Computing and Technology Literacy Computer Systems, Data, and Algorithms Program Design and Verification Programming Language
relating to household s disposable income. A Gini Coefficient of zero indicates
Gini Coefficient The Gini Coefficient is a measure of income inequality which is based on data relating to household s disposable income. A Gini Coefficient of zero indicates perfect income equality, whereas
Overview of E0222: Automata and Computability
Overview of E0222: Automata and Computability Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. August 3, 2011 What this course is about What we study
6.080/6.089 GITCS Feb 12, 2008. Lecture 3
6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my
Cisco Conference Connection
Data Sheet Cisco Conference Connection Cisco IP Communications a comprehensive system of powerful, enterprise-class solutions including IP telephony, unified communications, IP video/audio conferencing,
PROGRAM LOGICS FOR CERTIFIED COMPILERS
PROGRAM LOGICS FOR CERTIFIED COMPILERS Separation logic is the twenty-first-century variant of Hoare logic that permits verification of pointer-manipulating programs. This book covers practical and theoretical
Computer Science Information Sheet for entry in 2016. What is Computer Science?
Computer Science Information Sheet for entry in 2016 What is Computer Science? Computer Science is about understanding computer systems and networks at a deep level. Computers and the programs they run
Verifying Specifications with Proof Scores in CafeOBJ
Verifying Specifications with Proof Scores in CafeOBJ FUTATSUGI, Kokichi 二 木 厚 吉 Chair of Language Design Graduate School of Information Science Japan Advanced Institute of Science and Technology (JAIST)
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
Mathematics in Computer Science Curricula
Mathematics in Computer Science Curricula School of Computer Science Carnegie Mellon University Pittsburgh, PA Sixth International Conference on Mathematics of Program Construction July 2002, Dagstuhl,
Supported Payment Methods
Supported Payment Methods Global In the global payments market, credit cards are the most popular payment method. However, BlueSnap expands the payment selection by including not only the major credit
The Helsinki Communiqué
The Helsinki Communiqué on Enhanced European Cooperation in Vocational Education and Training Communiqué of the European Ministers of Vocational Education and Training 1, the European Social partners 2
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science
Supported Payment Methods
Sell Globally in a Snap Supported Payment Methods Global In the global payments market, credit cards are the most popular payment method. However, BlueSnap expands the payment selection by including not
MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION
MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION (MIPIE) An exploration of challenges and opportunities for developing indicators
Software Engineering using Formal Methods
Software Engineering using Formal Methods Model Checking with Temporal Logic Wolfgang Ahrendt 24th September 2013 SEFM: Model Checking with Temporal Logic /GU 130924 1 / 33 Model Checking with Spin model
NetFlow Feature Acceleration
WHITE PAPER NetFlow Feature Acceleration Feature Description Rapid growth in Internet and intranet deployment and usage has created a major shift in both corporate and consumer computing paradigms. This
EBA REPORT ON THE BENCHMARKING OF DIVERSITY PRACTICES. EBA-Op-2016-10 08 July 2016
EBA REPORT ON THE BENCHMARKING OF DIVERSITY PRACTICES EBA-Op-2016-10 08 July 2016 BENCHMARKING OF DIVERSITY PRACTICES AT THE EU LEVEL Benchmarking of diversity practices at the European Union level List
E-Seminar. Financial Management Internet Business Solution Seminar
E-Seminar Financial Management Internet Business Solution Seminar Financial Management Internet Business Solution Seminar 3 Welcome 4 Objectives 5 Financial Management 6 Financial Management Defined 7
How To Write A Program Verification And Programming Book
Jose Bacelar Almeida Maria Joao Frade Jorge Sousa Pinto Simao Melo de Sousa Rigorous Software Development An Introduction to Program Verification & Springer Contents 1 Introduction 1 1.1 A Formal Approach
https://sites.google.com/a/asu.edu/cse-522-spring-12/ sensors and actuators? How do we handle the errors introduced due to noise, quantization etc?
CSE 522 Spring 12 https://sites.google.com/a/asu.edu/cse-522-spring-12/ 1 of 3 5/29/2012 16:56 CSE 522 Spring 12 Navigation CSE522: Real-Time Embedded Systems The Schedule Sitemap CSE522: Real-Time Embedded
STATUS REPORT ON MAUDE-NPA TOOL
STATUS REPORT ON MAUDE-NPA TOOL Catherine Meadows Santiago Escobar Jose Meseguer September 28, 2006 1 GOAL Extend standard free algebra model of crypto protocol analysis to deal with algebraic properties
TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS. Paulo Magina Public Sector Integrity Division
TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS Paulo Magina Public Sector Integrity Division 10 th Public Procurement Knowledge Exchange Platform Istanbul, May 2014 The Organization for Economic
Waiting times and other barriers to health care access
Dr. Frank Niehaus Wissenschaftliches Institut der PKV (Scientific Research Institute of the Association of German Private Health Insurers) Waiting times and other barriers to health care access 31.8 %
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of
