[图书][B] Collective animal behavior

DJT Sumpter - 2010 - degruyter.com
Fish travel in schools, birds migrate in flocks, honeybees swarm, and ants build trails. How
and why do these collective behaviors occur? Exploring how coordinated group patterns …

[图书][B] Handbook of process algebra

JA Bergstra, A Ponse, SA Smolka - 2001 - books.google.com
Process Algebra is a formal description technique for complex computer systems, especially
those involving communicating, concurrently executing components. It is a subject that …

[图书][B] Introduction to process algebra

W Fokkink - 2013 - books.google.com
Automated and semi-automated manipulation of so-called labelled transition systems has
become an important means in discovering flaws in software and hardware systems …

[图书][B] Computer science handbook

AB Tucker - 2004 - taylorfrancis.com
When you think about how far and fast computer science has progressed in recent years, it's
not hard to conclude that a seven-year old handbook may fall a little short of the kind of …

[图书][B] Concepts, algorithms, and tools for model checking

JP Katoen - 1999 - researchgate.net
In daily life we are more and more confronted with information technology, either explicitly
(by using PCs, Internet, Personal Digital Assistants, etc.) or implicitly by using devices like …

[图书][B] Modelling distributed systems

W Fokkink, JF Groote, M Reniers - 2007 - Springer
A distributed system is driven by separate components that are executed in parallel, and
protocols for such systems form a major aspect of system design in today's world of wireless …

Use of sequencing constraints for specification-based testing of concurrent programs

RH Carver, KC Tai - IEEE Transactions on Software …, 1998 - ieeexplore.ieee.org
This paper presents and evaluates a specification-based methodology for testing concurrent
programs. This methodology requires sequencing constraints, which specify restrictions on …

Evaluating model checking for cyber threats code obfuscation identification

F Martinelli, F Mercaldo, V Nardone, A Santone… - Journal of Parallel and …, 2018 - Elsevier
Code obfuscation is a set of transformations that make code programs harder to understand.
The goal of code obfuscation is to make reverse engineering of programs infeasible, while …

[PDF][PDF] Verification of parallel programs with the Owicki-Gries and Rely-Guarantee methods in Isabelle, HOL.

LP Nieto - 2002 - www-sop.inria.fr
Verification of Parallel Programs with the Owicki-Gries and Rely-Guarantee Methods in
Isabelle/HOL Page 1 Verification of Parallel Programs with the Owicki-Gries and Rely-Guarantee …

Model checking fault tolerant systems

C Bernardeschi, A Fantechi… - … testing, verification and …, 2002 - Wiley Online Library
This paper proposes a modelling approach suitable for formalizing fault tolerant systems,
taking into account different fault scenarios. Verification of the properties of such systems is …