From the Publisher:
Deliberately non-mathematical, this user-friendly tutorial contains extensive introductory information on formal methods and the three Formal Description Techniques (FDTs). Easy-to-follow instructions demonstrate how to develop specifications and implementations using FDTs. Features valuable material on existing tools and gives references to publications, workshops, conferences and symposia where you can obtain the latest information on FDTs, their applications and tools. Copiously illustrated with examples.
Cited By
- Barlas K, Berki E, Stefaneas P and Koletsos G (2017). Towards formal open standards, Innovations in Systems and Software Engineering, 13:1, (51-66), Online publication date: 1-Mar-2017.
- (2016). Writing and verifying interoperability requirements, Computers in Industry, 82:C, (1-18), Online publication date: 1-Oct-2016.
- Carver R and Lei Y A Modular Approach to Model-Based Testing of Concurrent Programs Proceedings of the International Conference on Multicore Software Engineering, Performance, and Tools - Volume 8063, (85-96)
- Shilov N, Akinin A, Zubkov A and Idrisov R Development of the computer language classification knowledge portal Proceedings of the 8th international conference on Perspectives of System Informatics, (340-348)
- Deng Y, Grumbach S and Monin J A framework for verifying data-centric protocols Proceedings of the joint 13th IFIP WG 6.1 and 30th IFIP WG 6.1 international conference on Formal techniques for distributed systems, (106-120)
- Zhou L (2009). Building reliable large-scale distributed systems, ACM SIGACT News, 40:3, (78-85), Online publication date: 25-Sep-2009.
- Khan J and Zaghal R (2006). Interactive Transparent Networking, Computer Communications, 29:17, (3536-3552), Online publication date: 1-Nov-2006.
- Le Gall T, Jeannet B and Jéron T Verification of communication protocols using abstract interpretation of FIFO queues Proceedings of the 11th international conference on Algebraic Methodology and Software Technology, (204-219)
- Loo B, Condie T, Hellerstein J, Maniatis P, Roscoe T and Stoica I Implementing declarative overlays Proceedings of the twentieth ACM symposium on Operating systems principles, (75-90)
- Loo B, Condie T, Hellerstein J, Maniatis P, Roscoe T and Stoica I (2005). Implementing declarative overlays, ACM SIGOPS Operating Systems Review, 39:5, (75-90), Online publication date: 20-Oct-2005.
- Ramalingom T, Thulasiraman K and Das A (2003). Context independent unique state identification sequences for testing communication protocols modelled as extended finite state machines, Computer Communications, 26:14, (1622-1633), Online publication date: 1-Sep-2003.
- Koning J and Huget M Interaction Protocol Design Proceedings of the 2nd IEEE International Conference on Cognitive Informatics
- Hull R, Benedikt M, Christophides V and Su J E-services Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (1-14)
- Fenton N and Ohlsson N (2000). Quantitative Analysis of Faults and Failures in a Complex Software System, IEEE Transactions on Software Engineering, 26:8, (797-814), Online publication date: 1-Aug-2000.
- Bolognesi T (2000). Toward Constraint-Object-Oriented Development, IEEE Transactions on Software Engineering, 26:7, (594-616), Online publication date: 1-Jul-2000.
- Wilkes D and Hashmi M Application of high level interface-based design to telecommunications system hardware Proceedings of the 36th annual ACM/IEEE Design Automation Conference, (778-783)
- Carver R and Tai K (1998). Use of Sequencing Constraints for Specification-Based Testing of Concurrent Programs, IEEE Transactions on Software Engineering, 24:6, (471-490), Online publication date: 1-Jun-1998.
- Mermet B and Méry D Service specifications Proceedings of the second workshop on Formal methods in software practice, (62-69)
- Mermet B and Mery D Incremental Specification of Telecommunication Services Proceedings of the 1st International Conference on Formal Engineering Methods
- Bowen J and Hinchey M The use of industrial-strength formal methods Proceedings of the 21st International Computer Software and Applications Conference, (332-337)
- Schlipf T, Buechner T, Fritz R, Helms M and Koehl J (2019). Formal verification made easy, IBM Journal of Research and Development, 41:4-5, (567-576), Online publication date: 1-Jul-1997.
- Ohlsson N, Eriksson A and Helander M (1997). Early Risk-Management by Identification of Fault-prone Modules, Empirical Software Engineering, 2:2, (166-173), Online publication date: 1-Feb-1997.
- Ohlsson N and Alberg H (1996). Predicting Fault-Prone Software Modules in Telephone Switches, IEEE Transactions on Software Engineering, 22:12, (886-894), Online publication date: 1-Dec-1996.
- Matthes F and Schmidt J Persistent Threads Proceedings of the 20th International Conference on Very Large Data Bases, (403-414)
Recommendations
Strategic Testing Environment with Formal Description Techniques
Special issue on protocol engineeringThe authors describe the design of a testing environment, called FOREST (formal environment for systematic testing), for communication systems. The proposed method integrates three major strategies: (1) the use of formal description techniques (FDTs), ...
Towards a formal foundation of the specification and description language SDL
AbstractA formal model is described for the CCITT specification and description language SDL which provides a graphical concept for representing designs of systems interacting by signals. The model is based on functional descriptions of interactive ...