Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Using Formal Description Techniques: An Introduction to Estelle, Lotos, and SDLJanuary 1993
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-93455-4
Published:01 January 1993
Pages:
460
Skip Bibliometrics Section
Reflects downloads up to 09 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

Deliberately non-mathematical, this user-friendly tutorial contains extensive introductory information on formal methods and the three Formal Description Techniques (FDTs). Easy-to-follow instructions demonstrate how to develop specifications and implementations using FDTs. Features valuable material on existing tools and gives references to publications, workshops, conferences and symposia where you can obtain the latest information on FDTs, their applications and tools. Copiously illustrated with examples.

Cited By

  1. Barlas K, Berki E, Stefaneas P and Koletsos G (2017). Towards formal open standards, Innovations in Systems and Software Engineering, 13:1, (51-66), Online publication date: 1-Mar-2017.
  2. (2016). Writing and verifying interoperability requirements, Computers in Industry, 82:C, (1-18), Online publication date: 1-Oct-2016.
  3. Carver R and Lei Y A Modular Approach to Model-Based Testing of Concurrent Programs Proceedings of the International Conference on Multicore Software Engineering, Performance, and Tools - Volume 8063, (85-96)
  4. Shilov N, Akinin A, Zubkov A and Idrisov R Development of the computer language classification knowledge portal Proceedings of the 8th international conference on Perspectives of System Informatics, (340-348)
  5. Deng Y, Grumbach S and Monin J A framework for verifying data-centric protocols Proceedings of the joint 13th IFIP WG 6.1 and 30th IFIP WG 6.1 international conference on Formal techniques for distributed systems, (106-120)
  6. ACM
    Zhou L (2009). Building reliable large-scale distributed systems, ACM SIGACT News, 40:3, (78-85), Online publication date: 25-Sep-2009.
  7. Khan J and Zaghal R (2006). Interactive Transparent Networking, Computer Communications, 29:17, (3536-3552), Online publication date: 1-Nov-2006.
  8. Le Gall T, Jeannet B and Jéron T Verification of communication protocols using abstract interpretation of FIFO queues Proceedings of the 11th international conference on Algebraic Methodology and Software Technology, (204-219)
  9. ACM
    Loo B, Condie T, Hellerstein J, Maniatis P, Roscoe T and Stoica I Implementing declarative overlays Proceedings of the twentieth ACM symposium on Operating systems principles, (75-90)
  10. ACM
    Loo B, Condie T, Hellerstein J, Maniatis P, Roscoe T and Stoica I (2005). Implementing declarative overlays, ACM SIGOPS Operating Systems Review, 39:5, (75-90), Online publication date: 20-Oct-2005.
  11. Ramalingom T, Thulasiraman K and Das A (2003). Context independent unique state identification sequences for testing communication protocols modelled as extended finite state machines, Computer Communications, 26:14, (1622-1633), Online publication date: 1-Sep-2003.
  12. Koning J and Huget M Interaction Protocol Design Proceedings of the 2nd IEEE International Conference on Cognitive Informatics
  13. ACM
    Hull R, Benedikt M, Christophides V and Su J E-services Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (1-14)
  14. Fenton N and Ohlsson N (2000). Quantitative Analysis of Faults and Failures in a Complex Software System, IEEE Transactions on Software Engineering, 26:8, (797-814), Online publication date: 1-Aug-2000.
  15. Bolognesi T (2000). Toward Constraint-Object-Oriented Development, IEEE Transactions on Software Engineering, 26:7, (594-616), Online publication date: 1-Jul-2000.
  16. ACM
    Wilkes D and Hashmi M Application of high level interface-based design to telecommunications system hardware Proceedings of the 36th annual ACM/IEEE Design Automation Conference, (778-783)
  17. Carver R and Tai K (1998). Use of Sequencing Constraints for Specification-Based Testing of Concurrent Programs, IEEE Transactions on Software Engineering, 24:6, (471-490), Online publication date: 1-Jun-1998.
  18. ACM
    Mermet B and Méry D Service specifications Proceedings of the second workshop on Formal methods in software practice, (62-69)
  19. Mermet B and Mery D Incremental Specification of Telecommunication Services Proceedings of the 1st International Conference on Formal Engineering Methods
  20. Bowen J and Hinchey M The use of industrial-strength formal methods Proceedings of the 21st International Computer Software and Applications Conference, (332-337)
  21. Schlipf T, Buechner T, Fritz R, Helms M and Koehl J (2019). Formal verification made easy, IBM Journal of Research and Development, 41:4-5, (567-576), Online publication date: 1-Jul-1997.
  22. Ohlsson N, Eriksson A and Helander M (1997). Early Risk-Management by Identification of Fault-prone Modules, Empirical Software Engineering, 2:2, (166-173), Online publication date: 1-Feb-1997.
  23. Ohlsson N and Alberg H (1996). Predicting Fault-Prone Software Modules in Telephone Switches, IEEE Transactions on Software Engineering, 22:12, (886-894), Online publication date: 1-Dec-1996.
  24. Matthes F and Schmidt J Persistent Threads Proceedings of the 20th International Conference on Very Large Data Bases, (403-414)
Contributors
  • University of Stirling

Recommendations