Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Formal Aspects of Computing
Springer-Verlag
 
   
 
Options:
 
  1-10 of 40 reviews Date Reviewed 
   Toward automatic verification of quantum programs
Ying M. Formal Aspects of Computing 31(1): 3-25, 2019.  Type: Article

Even if a world of quantum computing for everyone is years (if not decades) away, research on designing proper ways to program such systems has been ongoing for quite some time. History shows that programming is hard; making correct pr...

Jul 28 2020
   How testing helps to diagnose proof failures
Petiot G., Kosmatov N., Botella B., Giorgetti A., Julliand J. Formal Aspects of Computing 30(6): 629-657, 2018.  Type: Article

Petiot et al. present testing software components that help optimize the effort of “applying deductive verification to formally prove that a [computer] program respects its formal specification.”...

May 10 2019
  Formal verification and quantitative metrics of MPSoC data dynamics
Zhang H., Wu J. Formal Aspects of Computing 30(2): 219-237, 2018.  Type: Article

MPSoC stands for “multiprocessor system-on-a-chip.” This paper treats verification via simulation of the design and expected behavior of such multiprocessor, multitasking systems....

Jun 7 2018
  A semantics comparison workbench for a concurrent, asynchronous, distributed programming language
Corrodi C., Heu&bgr;ner A., Poskitt C. Formal Aspects of Computing 30(1): 163-192, 2018.  Type: Article

Changes in distributed-system runtime support in response to changes in technological and operational circumstances may also change the services offered to supported systems. The graph-based semantics comparison workbench described in ...

May 23 2018
  Model-based testing of probabilistic systems
Gerhold M., Stoelinga M. Formal Aspects of Computing 30(1): 77-106, 2018.  Type: Article

Gerhold and Stoelinga’s paper proposes an interesting framework to test probabilistic systems based on the concepts of soundness and completeness. The crux of their argument is “the conformance relation for probabil...

Apr 18 2018
  A compositional modelling and verification framework for stochastic hybrid systems
Wang S., Zhan N., Zhang L. Formal Aspects of Computing 29(4): 751-775, 2017.  Type: Article

The need to explore new formalisms for specifying, implementing, and verifying systems is driven by the increasing complexity of systems we wish to analyze and synthesize. At the same time, there is a growing realization of the need fo...

Mar 29 2018
  On partial state matching
Jančík P., Kofroň J. Formal Aspects of Computing 29(5): 777-803, 2017.  Type: Article

The code of a procedural-language computer program includes variables that have values at any given point during execution of that program. The state at a point of execution of a program includes the collection of values of all variabl...

Feb 28 2018
  Designing a semantic model for a wide-spectrum language with concurrency
Colvin R., Hayes I., Meinicke L. Formal Aspects of Computing 29(5): 853-875, 2017.  Type: Article

A concurrent wide-spectrum language combines a concurrent programming language with specification constructs. Colvin et al. provide a unified framework for defining the semantics of such languages. The semantics is trace-based and capt...

Jan 10 2018
  Incremental bounded model checking for embedded software
Schrammel P., Kroening D., Brain M., Martins R., Teige T., Bienmüller T. Formal Aspects of Computing 29(5): 911-931, 2017.  Type: Article

Bounded model checking is employed in tools for the formal verification of C programs such as the C bounded model checker (CBMC). The key idea of this technique is to unwind unbounded program loops to a fixed depth and to translate the...

Dec 4 2017
  Partial evaluation of string obfuscations for Java malware detection
Chawdhary A., Singh R., King A. Formal Aspects of Computing 29(1): 33-55, 2017.  Type: Article

Cyber security has become a major concern in government, industry, and academia and in the everyday lives of individuals. How we secure our information systems and maintain the privacy and integrity of our online presence and data is a...

Oct 2 2017
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy