Academic literature on the topic 'Formal methds'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Formal methds.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Formal methds"

1

Woodcock, Jim, Peter Gorm Larsen, Juan Bicarregui, and John Fitzgerald. "Formal methods." ACM Computing Surveys 41, no. 4 (October 2009): 1–36. http://dx.doi.org/10.1145/1592434.1592436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Berry, Daniel M. "Formal Methods:." Electronic Notes in Theoretical Computer Science 25 (1999): 10–22. http://dx.doi.org/10.1016/s1571-0661(04)00127-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leveson, Nancy. "Formal methods." ACM SIGSOFT Software Engineering Notes 17, no. 1 (January 1992): 49–50. http://dx.doi.org/10.1145/134292.134298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wing, Jeannette M. "Formal methods." ACM SIGAda Ada Letters 33, no. 3 (November 29, 2013): 85–86. http://dx.doi.org/10.1145/2658982.2527291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

van der Linden, Frank J. "Formal methods." ACM SIGPLAN Notices 29, no. 7 (July 1994): 29–38. http://dx.doi.org/10.1145/181593.184668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Clarke, Edmund M., and Jeannette M. Wing. "Formal methods." ACM Computing Surveys 28, no. 4 (December 1996): 626–43. http://dx.doi.org/10.1145/242223.242257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Emerson, E. Allen. "Automated formal methods." ACM SIGSOFT Software Engineering Notes 25, no. 1 (January 2000): 49. http://dx.doi.org/10.1145/340855.340886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jones, Cliff. "Formal methods light." ACM Computing Surveys 28, no. 4es (December 1996): 121. http://dx.doi.org/10.1145/242224.242380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Moore, J. Strother. "Functional formal methods." ACM SIGPLAN Notices 37, no. 9 (September 17, 2002): 123. http://dx.doi.org/10.1145/583852.581490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

George, Louis. "Non-Formal Methods of Chemistry Education." Mapana - Journal of Sciences 4, no. 1 (July 18, 2005): 36–41. http://dx.doi.org/10.12723/mjs.6.8.

Full text
Abstract:
From about 1980' s non•formai education became very popular in India, but the thrust from the establishment and promotions through official channels made the movement formal in operative terms. Though nan-formal was defined on paper in terms Of flexibility, openness, ease Of entry, relevance to life, creativity etc, in effect, much of what was provided under this wos sub-standard education for the poor and disadvantaged groups. Various agencies made commendable prognss in the Oi non-forrnal education in science and one Of them whick made remarkable contribution to spread the spirit Of science through a functional mass movernent is The Kerala Shastra Sahitya Parish ad.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Formal methds"

1

Al-Jaljouli, Raja Computer Science &amp Engineering Faculty of Engineering UNSW. "A proposed security protocol for data gathering mobile agents." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23999.

Full text
Abstract:
We address the security issue of the data which mobile agents gather as they are traversing the Internet. Our goal is to devise a security protocol that truly secures the data which mobile agents gather. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals unforeseen security flaws, such as truncation or alteration of the collected data, breaching the privacy of the gathered data, sending others data under the private key of a malicious host, and replacing the collected data with data of similar agents. So the existing protocols are not truly secure. We present an accurate security protocol which aims to assert strong integrity, authenticity, and confidentiality of the gathered data. The proposed protocol is derived from the Multi-hops protocol. The protocol suffers from security flaws, e.g. an adversary might truncate/ replace collected data, or sign others data with its own private key without being detected. The proposed protocol refines the Multi-hops protocol by implementing the following security techniques: utilization of co-operating agents, scrambling the gathered offers, requesting a visited host to clear its memory from any data acquired as a result of executing the agent before the host dispatches the agent to the succeeding host in the agent???s itinerary, and carrying out verifications on the identity of the genuine initiator at the early execution of the agent at visited hosts, in addition to the verifications upon the agent???s return to the initiator. The proposed protocol also implements the common security techniques such as public key encryption, digital signature, etc. The implemented security techniques would rectify the security flaws revealed in the existing protocols. We use STA, an infinite-state exploration tool, to verify the security properties of a reasonably small instance of the proposed protocol in key configurations. The analysis using STA reports no attack. Moreover, we carefully reason the correctness of the security protocol for a general model and show that the protocol would be capable of preventing or at least detecting the attacks revealed in the existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
2

Razali, Rozilawati. "Usability of semi-formal and formal methods integration : empirical assessments." Thesis, University of Southampton, 2008. https://eprints.soton.ac.uk/265391/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fredriksen, Inge. "Formal Methods for System Development." Thesis, Norwegian University of Science and Technology, Department of Engineering Cybernetics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9991.

Full text
Abstract:

Two main types of formal methods have been investigated, formal specification and formal verification. Focus for formal verification has been on the concept of un-timed model checking. Some dominating formal specification languages, VDM and Z, and some prominent model checkers, FDR, Spin, and LTSA, have been learnt and presented. A tutorial for the formal verification tool Spin is created. The tutorial is example driven and describes the description language Promela and the verification methods available in Spin. Care has been taken to illustrate reasoning about the results from Spin. Topics discussed include the applicability and need for formal methods, the possible need for understanding the underlying theory, and considerations made in regards to creating the tutorial.

APA, Harvard, Vancouver, ISO, and other styles
4

Matthews, Chris, and mikewood@deakin edu au. "Fuzzy concepts and formal methods." Deakin University. School of Management Information Systems, 2001. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051201.154843.

Full text
Abstract:
It has been recognised that formal methods are useful as a modelling tool in requirements engineering. Specification languages such as Z permit the precise and unambiguous modelling of system properties and behaviour. However some system problems, particularly those drawn from the information systems problem domain, may be difficult to model in crisp or precise terms. It may also be desirable that formal modelling should commence as early as possible, even when our understanding of parts of the problem domain is only approximate. This thesis suggests fuzzy set theory as a possible representation scheme for this imprecision or approximation. A fuzzy logic toolkit that defines the operators, measures and modifiers necessary for the manipulation of fuzzy sets and relations is developed. The toolkit contains a detailed set of laws that demonstrate the properties of the definitions when applied to partial set membership. It also provides a set of laws that establishes an isomorphism between the toolkit notation and that of conventional Z when applied to boolean sets and relations. The thesis also illustrates how the fuzzy logic toolkit can be applied in the problem domains of interest. Several examples are presented and discussed including the representation of imprecise concepts as fuzzy sets and relations, system requirements as a series of linguistically quantified propositions, the modelling of conflict and agreement in terms of fuzzy sets and the partial specification of a fuzzy expert system. The thesis concludes with a consideration of potential areas for future research arising from the work presented here.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Y. "Formal methods for global synchrony." Thesis, University of Oxford, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hinchey, Michael Gerard. "Structural design and formal methods." Thesis, University of Cambridge, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.624390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Read, Simon. "Formal methods for VLSI design." Thesis, University of Manchester, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.239786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wood, Clark S. M. Massachusetts Institute of Technology. "A formal methods safe harbor." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122219.

Full text
Abstract:
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, 2019
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 77-84).
We discuss a problem: Internet of Things devices running software are vulnerable to accidents and exploitation, a technology solution: preventing exploitable bugs by developing machine-checked proofs of software correctness and security, and a policy lever to incentivize adoption of this solution: a safe harbor from FTC unfairness prosecution for manufacturers that use formal methods to guarantee safer, more secure devices. To motivate the potential of formal methods, we present a technical contribution: a formally verified connected lightbulb switch, proven immune to certain types of software exploits. We discuss a framework, the Common Weakness Enumeration, that the FTC and manufacturers could use as a shared language to explain what classes of software vulnerability a manufacturer will defend against. We outline the authority of the FTC in regards to poor data security practices as unfair practices and how our safe harbor would both provide immunity to participants and be updated over time to continue to incentivize ever stronger software protections.
by Clark Wood.
S.M. in Technology and Policy
S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society
APA, Harvard, Vancouver, ISO, and other styles
9

Yao, Yow-Wei. "Formal methods for protocol conversion /." The Ohio State University, 1991. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487693923198251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Banks, Michael J. "On confidentiality and formal methods." Thesis, University of York, 2012. http://etheses.whiterose.ac.uk/2709/.

Full text
Abstract:
The contemporary challenge of engineering verifiably secure software has motivated various techniques for measuring and regulating the flow of confidential data from systems to their users. Unfortunately, these techniques suffer from a lack of integration with modern formal methods for software development, which inhibits their application in practice. This thesis proposes a novel approach for integrating information flow security concerns with formal methods. Working in the Unifying Theories of Programming (UTP), this thesis presents a generic framework for modelling interactions between users and systems. This framework can be applied to encode information flow about a system's activities to its users. It thereby allows confidentiality properties to be formalised in the UTP as upper bounds on information flow to users. The main contribution of this thesis is a unified platform for designing software that is not only functionally correct, but also secure by design. This platform specialises the information flow encoding to the Circus formal method, making it possible to specify confidentiality properties within Circus processes. In this setting, conflicts between functionality and confidentiality are represented as miracles, rendering insecure functionality infeasible. The platform provides techniques for verifying that functionality and confidentiality properties are mutually consistent. These techniques can be applied to develop a process through a series of feasibility-preserving refinement steps, to achieve a system implementation that does not leak secret information to untrusted users. These techniques are evaluated with a brief case study.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Formal methds"

1

Boulanger, Jean-Louis, ed. Formal Methods. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118561898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Havelund, Klaus, Jan Peleska, Bill Roscoe, and Erik de Vink, eds. Formal Methods. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95582-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nielson, Flemming, and Hanne Riis Nielson. Formal Methods. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05156-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Araki, Keijiro. Formal methods: Proceedings. Berlin: Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brat, Guillaume, Neha Rungta, and Arnaud Venet, eds. NASA Formal Methods. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38088-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Derrick, John, Stefania Gnesi, Diego Latella, and Helen Treharne, eds. Integrated Formal Methods. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30729-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Havelund, Klaus, Gerard Holzmann, and Rajeev Joshi, eds. NASA Formal Methods. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17524-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Polikarpova, Nadia, and Steve Schneider, eds. Integrated Formal Methods. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66845-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Leuschel, Michael, and Heike Wehrheim, eds. Integrated Formal Methods. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00255-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Albert, Elvira, and Emil Sekerinski, eds. Integrated Formal Methods. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10181-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Formal methds"

1

Lysne, Olav. "Formal Methods." In The Huawei and Snowden Questions, 75–85. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74950-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

O’Regan, Gerard. "Formal Methods." In Undergraduate Topics in Computer Science, 185–207. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57750-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Peled, Doron A. "Formal Methods." In Handbook of Software Engineering, 193–222. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-00262-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Turner, Raymond. "Formal Methods." In Computational Artifacts, 151–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-55565-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kao, Ming-Yang. "Formal Methods." In Encyclopedia of Algorithms, 322. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-30162-4_147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

O’Regan, Gerard. "Formal Methods." In The Innovation in Computing Companion, 133–36. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02619-6_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

O’Regan, Gerard. "Formal Methods." In Introduction to Software Quality, 289–309. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06106-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

O’Regan, Gerard. "Formal Methods." In Mathematics in Computing, 89–108. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4534-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hall, Anthony, Jonathan P. Bowen, Michael G. Hinchey, Jeannette M. Wing, and C. A. R. Hoare. "Formal Methods." In High-Integrity System Specification and Design, 127–230. London: Springer London, 1999. http://dx.doi.org/10.1007/978-1-4471-3431-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Craigen, Dan, and Karen Summerskill. "Formal Methods." In Workshops in Computing, 33–62. London: Springer London, 1990. http://dx.doi.org/10.1007/978-1-4471-3532-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Formal methds"

1

"[Front cover]." In 2009 Fourth South-East European Workshop on Formal Methods. Formal Methods for Web Services, Formal Methods for Agent-Based Systems (SEEFM 2009). IEEE, 2009. http://dx.doi.org/10.1109/seefm.2009.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Table of contents." In 2009 Fourth South-East European Workshop on Formal Methods. Formal Methods for Web Services, Formal Methods for Agent-Based Systems (SEEFM 2009). IEEE, 2009. http://dx.doi.org/10.1109/seefm.2009.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wing, Jeannette M. "Formal methods." In the 2013 ACM SIGAda annual conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2527269.2527291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cavada, Roberto, Alessandro Cimatti, Anders Franzen, Krishnamani Kalyanasundaram, Marco Roveri, and R. K. Shyamasundar. "Computing Predicate Abstractions by Integrating BDDs and SMT Solvers." In Formal Methods in Computer Aided Design. IEEE, 2007. http://dx.doi.org/10.1109/famcad.2007.35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shore, Richard P. "A Use Case Interpretation of B AMN." In 2nd Irish Workshop on Formal Methods. BCS Learning & Development, 1998. http://dx.doi.org/10.14236/ewic/fm1998.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Couturier, Raphaël. "Formal engineering of the bitonic sort using PVS." In 2nd Irish Workshop on Formal Methods. BCS Learning & Development, 1998. http://dx.doi.org/10.14236/ewic/fm1998.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gibbons, Hugh. "Declarative View of Imperative Programs." In 2nd Irish Workshop on Formal Methods. BCS Learning & Development, 1998. http://dx.doi.org/10.14236/ewic/fm1998.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goldson, Doug. "Multiprogram Design in the theory of Owicki and Gries." In 5th Irish Workshop on Formal Methods. BCS Learning & Development, 2001. http://dx.doi.org/10.14236/ewic/iwfm2001.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Droschl, Georg. "On the Integration of Formal Methods: Events and Scenarios in PVS and VDM." In 3rd Irish Workshop on Formal Methods. BCS Learning & Development, 1999. http://dx.doi.org/10.14236/ewic/iwfm1999.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bryans, Jeremy, and John Derrick. "Stochastic Specification and Verification." In 3rd Irish Workshop on Formal Methods. BCS Learning & Development, 1999. http://dx.doi.org/10.14236/ewic/iwfm1999.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Formal methds"

1

WETSTONE TECHNOLOGIES CORTLAND NY. Formal Methods Framework. Fort Belvoir, VA: Defense Technical Information Center, February 2002. http://dx.doi.org/10.21236/ada399514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Black, Paul E. Formal methods for statistical software. Gaithersburg, MD: National Institute of Standards and Technology, October 2019. http://dx.doi.org/10.6028/nist.ir.8274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teitelbaum, Ray. A Prototype Formal Methods Environment. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada389751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Witzel, Wayne, Kenneth Michael Rudinger, and Mohan Sarovar. Versatile Formal Methods Applied to Quantum Information. Office of Scientific and Technical Information (OSTI), November 2015. http://dx.doi.org/10.2172/1331534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moriconi, Mark. Structure Based Formal Methods for Software Engineering. Fort Belvoir, VA: Defense Technical Information Center, July 1989. http://dx.doi.org/10.21236/ada211660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weber, D. G., Cheryl Barbasch, and James Morris. Ada Formal Methods in the STARS Environment. Fort Belvoir, VA: Defense Technical Information Center, June 1992. http://dx.doi.org/10.21236/ada257431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rushby, John. A Formal Methods Workbench for Critical Systems. Fort Belvoir, VA: Defense Technical Information Center, May 2000. http://dx.doi.org/10.21236/ada378690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Heitmeyer, Constance. On the Need for Practical Formal Methods. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada465485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Wenchao. Formal Methods for Reverse Engineering Gate-Level Netlists. Fort Belvoir, VA: Defense Technical Information Center, December 2013. http://dx.doi.org/10.21236/ada623698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meadows, Catherine. Open Issues in Formal Methods for Cryptographic Protocol Analysis. Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada385327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography