Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Semantics with applications: a formal introductionMay 1992
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-92980-2
Published:01 May 1992
Pages:
240
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Nikitchenko M (2022). Composition-Nominative Methods and Models in Program Development, SN Computer Science, 3:6, Online publication date: 6-Oct-2022.
  2. Klinik M, Gastel B, Kop C and Eekelen M Skylines for Symbolic Energy Consumption Analysis Formal Methods for Industrial Critical Systems, (93-112)
  3. ACM
    Schoolderman M, Smetsers S and van Eekelen M Is Deductive Program Verification Mature Enough to be Taught to Software Engineers? Proceedings of the 8th Computer Science Education Research Conference, (50-57)
  4. Tikhonova U (2019). Reusable specification templates for defining dynamic semantics of DSLs, Software and Systems Modeling (SoSyM), 18:1, (691-720), Online publication date: 1-Feb-2019.
  5. ACM
    Leißa R, Boesche K, Hack S, Pérard-Gayot A, Membarth R, Slusallek P, Müller A and Schmidt B (2018). AnyDSL: a partial evaluation framework for programming high-performance libraries, Proceedings of the ACM on Programming Languages, 2:OOPSLA, (1-30), Online publication date: 24-Oct-2018.
  6. ACM
    Lippe T, Smith T, Pelsmaeker D and Visser E A scalable infrastructure for teaching concepts of programming languages in Scala with WebLab: an experience report Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala, (65-74)
  7. Soulé R, Hirzel M, Gedik B and Grimm R (2016). River, Software—Practice & Experience, 46:7, (891-929), Online publication date: 1-Jul-2016.
  8. Ferreira B, Soares-Filho B and Pereira F The Dinamica Virtual Machine for Geosciences Proceedings of the 19th Brazilian Symposium on Programming Languages - Volume 9325, (44-58)
  9. Koopman P and Plasmeijer R Type-Safe Functions and Tasks in a Shallow Embedded DSL for Microprocessors Central European Functional Programming School, (283-340)
  10. ACM
    Jung A (2014). Semantics column, ACM SIGLOG News, 1:2, (25-37), Online publication date: 14-Oct-2014.
  11. ACM
    Androutsopoulos K, Clark D, Dan H, Hierons R and Harman M An analysis of the relationship between conditional entropy and failed error propagation in software testing Proceedings of the 36th International Conference on Software Engineering, (573-583)
  12. Nguyen C, Huynh V and Pedrycz W (2014). A construction of sound semantic linguistic scales using 4-tuple representation of term semantics, International Journal of Approximate Reasoning, 55:3, (763-786), Online publication date: 1-Mar-2014.
  13. Dong R, Faber J, Ke W and Liu Z rCOS Unifying Theories of Programming and Formal Engineering Methods, (1-66)
  14. Monin J and Shi X Handcrafted inversions made operational on operational semantics Proceedings of the 4th international conference on Interactive Theorem Proving, (338-353)
  15. Koopman P Functional Semantics Essays Dedicated to Rinus Plasmeijer on the Occasion of His 61st Birthday on The Beauty of Functional Code - Volume 8106, (60-78)
  16. Hoare T and van Staden S The laws of programming unify process calculi Proceedings of the 11th international conference on Mathematics of Program Construction, (7-22)
  17. Nipkow T Teaching semantics with a proof assistant Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation, (24-38)
  18. Xu Z, Kremenek T and Zhang J A memory model for static analysis of C programs Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part I, (535-548)
  19. ACM
    Porubän J, Sabo M, Kollár J and Mernik M Abstract syntax driven language development Proceedings of the International Workshop on Formalization of Modeling Languages, (1-5)
  20. ACM
    Lukman T, Mernik M, Demirezen Z, Bryant B and Gray J Automatic generation of model traversals from metamodel definitions Proceedings of the 48th Annual Southeast Regional Conference, (1-6)
  21. Koopman P, Plasmeijer R and Achten P An effective methodology for defining consistent semantics of complex systems Proceedings of the Third summer school conference on Central European functional programming school, (224-267)
  22. ACM
    Danvy O (2008). Defunctionalized interpreters for programming languages, ACM SIGPLAN Notices, 43:9, (131-142), Online publication date: 27-Sep-2008.
  23. ACM
    Danvy O Defunctionalized interpreters for programming languages Proceedings of the 13th ACM SIGPLAN international conference on Functional programming, (131-142)
  24. Koopman P, Plasmeijer R and Achten P An executable and testable semantics for iTasks Proceedings of the 20th international conference on Implementation and application of functional languages, (212-232)
  25. ACM
    Bertot Y and Komendantsky V Fixed point semantics and partial recursion in Coq Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming, (89-96)
  26. ACM
    Ayav T, Fradet P and Girault A (2008). Implementing fault-tolerance in real-time programs by automatic program transformations, ACM Transactions on Embedded Computing Systems, 7:4, (1-43), Online publication date: 1-Jul-2008.
  27. Balaban M and Jurk S (2008). Effect preservation in transaction processing in rule triggering systems, Acta Cybernetica, 18:4, (733-776), Online publication date: 20-Jan-2008.
  28. ACM
    Laud P (2008). On the computational soundness of cryptographically masked flows, ACM SIGPLAN Notices, 43:1, (337-348), Online publication date: 14-Jan-2008.
  29. ACM
    Laud P On the computational soundness of cryptographically masked flows Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (337-348)
  30. ACM
    Lester D Topology in PVS Proceedings of the second workshop on Automated formal methods, (11-20)
  31. Tšahhirov I and Laud P Application of dependency graphs to security protocol analysis Proceedings of the 3rd conference on Trustworthy global computing, (294-311)
  32. Hillebrand M and Paul W On the architecture of system verification environments Proceedings of the 3rd international Haifa verification conference on Hardware and software: verification and testing, (153-168)
  33. Hillebrand M and Paul W On the Architecture of System Verification Environments Hardware and Software: Verification and Testing, (153-168)
  34. Jones C Understanding programming language concepts via operational semantics Domain modeling and the duration calculus, (177-235)
  35. ACM
    Ayav T, Fradet P and Girault A Implementing fault-tolerance in real-time systems by automatic program transformations Proceedings of the 6th ACM & IEEE International conference on Embedded software, (205-214)
  36. Oermann A, Scheidat T, Vielhauer C and Dittmann J Semantic fusion for biometric user authentication as multimodal signal processing Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security, (546-553)
  37. Nestra H Fractional semantics Proceedings of the 11th international conference on Algebraic Methodology and Software Technology, (278-292)
  38. Paul W Towards a Worldwide Verification Technology Verified Software: Theories, Tools, Experiments, (19-25)
  39. Hillebrand M, Rieden T and Paul W Dealing with I/O Devices in the Context of Pervasive System Verification Proceedings of the 2005 International Conference on Computer Design, (309-316)
  40. Oermann A, Dittmann J and Vielhauer C Verifier-tuple as a classifier for biometric handwriting authentication Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (170-179)
  41. Leinenbach D, Paul W and Petrova E Towards the Formal Verification of a C0 Compiler Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (2-12)
  42. Jin N and He J Towards A Truly Concurrent Model for Processes Sharing Resources Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (231-239)
  43. Tolstrup T, Nielson F and Nielson H Information flow analysis for VHDL Proceedings of the 8th international conference on Parallel Computing Technologies, (79-98)
  44. Gargano M, Hillebrand M, Leinenbach D and Paul W On the correctness of operating system kernels Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics, (1-16)
  45. ACM
    Oermann A, Lang A and Dittmann J Verifier-tuple for audio-forensic to determine speaker environment Proceedings of the 7th workshop on Multimedia and security, (57-62)
  46. Bodei C, Buchholtz M, Degano P, Nielson F and Nielson H (2005). Static validation of security protocols, Journal of Computer Security, 13:3, (347-390), Online publication date: 1-May-2005.
  47. Glesner S (2005). A Proof Calculus for Natural Semantics Based on Greatest Fixed Point Semantics, Electronic Notes in Theoretical Computer Science (ENTCS), 132:1, (73-93), Online publication date: 1-May-2005.
  48. Ager M From natural semantics to abstract machines Proceedings of the 14th international conference on Logic Based Program Synthesis and Transformation, (245-261)
  49. Zhang F and H. D'Hollander E (2004). Using Hammock Graphs to Structure Programs, IEEE Transactions on Software Engineering, 30:4, (231-245), Online publication date: 1-Apr-2004.
  50. ACM
    Mosses P Exploiting labels in Structural Operational Semantics Proceedings of the 2004 ACM symposium on Applied computing, (1476-1481)
  51. ACM
    Zhang Y and Xu B (2004). A survey of semantic description frameworks for programming languages, ACM SIGPLAN Notices, 39:3, (14-30), Online publication date: 1-Mar-2004.
  52. Mosses P (2004). Exploiting Labels in Structural Operational Semantics, Fundamenta Informaticae, 60:1-4, (17-31), Online publication date: 1-Jan-2004.
  53. Mosses P (2003). Exploiting Labels in Structural Operational Semantics, Fundamenta Informaticae, 60:1-4, (17-31), Online publication date: 1-Sep-2003.
  54. Laud P Handling encryption in an analysis for secure information flow Proceedings of the 12th European conference on Programming, (159-173)
  55. Schmidt D Programming language semantics Encyclopedia of Computer Science, (1463-1466)
  56. ACM
    Hartel P and Moreau L (2001). Formalizing the safety of Java, the Java virtual machine, and Java card, ACM Computing Surveys, 33:4, (517-558), Online publication date: 1-Dec-2001.
  57. ACM
    De Giacomo G, Levesque H and Sardiña S (2001). Incremental execution of guarded theories, ACM Transactions on Computational Logic, 2:4, (495-525), Online publication date: 1-Oct-2001.
  58. Blazy S (2000). Specifying and Automatically Generating a Specialization Tool for Fortran 90, Automated Software Engineering, 7:4, (345-376), Online publication date: 1-Dec-2000.
  59. ACM
    Bakewell A and Runciman C A model for comparing the space usage of lazy evaluators Proceedings of the 2nd ACM SIGPLAN international conference on Principles and practice of declarative programming, (151-162)
  60. Bjørner D and Cuéllar J (1999). Software engineering education, Annals of Software Engineering, 6:1-4, (365-409), Online publication date: 1-Apr-1999.
  61. Le Métayer D, Nicolas V and Ridoux O (1998). Exploring the Software Development Trilogy, IEEE Software, 15:6, (75-81), Online publication date: 1-Nov-1998.
  62. ACM
    Clarke D, Potter J and Noble J (1998). Ownership types for flexible alias protection, ACM SIGPLAN Notices, 33:10, (48-64), Online publication date: 1-Oct-1998.
  63. ACM
    Clarke D, Potter J and Noble J Ownership types for flexible alias protection Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (48-64)
  64. ACM
    Clinger W (1998). Proper tail recursion and space efficiency, ACM SIGPLAN Notices, 33:5, (174-185), Online publication date: 1-May-1998.
  65. ACM
    Clinger W Proper tail recursion and space efficiency Proceedings of the ACM SIGPLAN 1998 conference on Programming language design and implementation, (174-185)
  66. Schmidt D (1998). Trace-Based Abstract Interpretation of Operational Semantics, Lisp and Symbolic Computation, 10:3, (237-271), Online publication date: 1-May-1998.
  67. ACM
    Schmidt D Data flow analysis is model checking of abstract interpretations Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (38-48)
  68. ACM
    Hartel P and Hertzberger L (1995). Paradigms and laboratories in the core computer science curriculum, ACM SIGCSE Bulletin, 27:4, (13-20), Online publication date: 1-Dec-1995.
  69. ACM
    Mernik M, Korbar N and Žumer V (1995). LISA, ACM SIGPLAN Notices, 30:4, (71-79), Online publication date: 1-Apr-1995.
  70. ACM
    Nielson H and Nielson F Bounded fixed point iteration Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (71-82)
Contributors
  • Technical University of Denmark
  • Technical University of Denmark

Recommendations