[图书][B] Verification of Object-Oriented Software. The KeY Approach: Foreword by K. Rustan M. Leino

B Beckert, R Hähnle, PH Schmitt - 2007 - books.google.com
Long gone are the days when program veri? cation was a task carried out merely by hand
with paper and pen. For one, we are increasingly interested in proving actual program …

Manifold discriminant analysis

R Wang, X Chen - 2009 IEEE Conference on Computer Vision …, 2009 - ieeexplore.ieee.org
This paper presents a novel discriminative learning method, called manifold discriminant
analysis (MDA), to solve the problem of image set classification. By modeling each image …

[图书][B] Computer science handbook

AB Tucker - 2004 - taylorfrancis.com
When you think about how far and fast computer science has progressed in recent years, it's
not hard to conclude that a seven-year old handbook may fall a little short of the kind of …

Using a process algebra to control B operations

H Treharne, S Schneider - IFM'99: Proceedings of the 1st International …, 1999 - Springer
The B-Method is a state-based formal method that describes system behaviour in terms of
MACHINES whose state changes under OPERATIONS. The process algebra CSP is an …

The role of eddies in the isopycnic transfer of nutrients and their impact on biological production

MM Lee, RG Williams - Journal of Marine Research, 2000 - ingentaconnect.com
Eddies provide a systematic, large-scale transfer of tracers and nutrients along isopycnals
through a combination of eddy-induced diffusion and advection. The nutrient distribution is …

Modeling a 200-yr interruption of the Holocene sapropel S1

PG Myers, EJ Rohling - Quaternary Research, 2000 - Elsevier
An oceanic general circulation model, previously used to simulate the conditions associated
with the Holocene Sapropel S1, is used to simulate the effects of a climate deterioration …

Engineering and theoretical underpinnings of retrenchment

R Banach, M Poppleton, C Jeske, S Stepney - Science of Computer …, 2007 - Elsevier
Refinement is reviewed, highlighting in particular the distinction between its use as a
specification constructor at a high level, and its use as an implementation mechanism at a …

Software hazard and safety analysis

J McDermid - International Symposium on Formal Techniques in …, 2002 - Springer
Safety is a system property and software, of itself, cannot be safe or unsafe. However
software has a major influence on safety in many modern systems, eg aircraft and engine …

Retrenching partial requirements into system definitions: A simple feature interaction case study

R Banach, M Poppleton - Requirements Engineering, 2003 - Springer
In conventional model-oriented formal refinement, the abstract model is supposed to capture
all the properties of interest in the system, in an as-clutter-free-as-possible manner …

Retrenching the purse: Finite sequence numbers, and the tower pattern

R Banach, M Poppleton, C Jeske, S Stepney - FM 2005: Formal Methods …, 2005 - Springer
Abstract The Mondex Electronic Purse system [18] is an outstanding example of formal
refinement techniques applied to a genuine industrial scale application, and notably, was …