NASA Formal Methods

4th International Symposium, NFM 2012, Norfolk, VA, USA, April 3-5, 2012. Proceedings

  • Alwyn E. Goodloe
  • Suzette Person

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7226)

Table of contents

  1. Front Matter
  2. Cesare Tinelli
    Pages 1-1
  3. Andrew W. Appel
    Pages 2-2
  4. Dennis Guck, Tingting Han, Joost-Pieter Katoen, Martin R. Neuhäußer
    Pages 8-23
  5. Alessio Ferrari, Alessandro Fantechi, Stefania Gnesi
    Pages 24-38
  6. Nicolas Brisebarre, Mioara Joldeş, Érik Martin-Dorel, Micaela Mayero, Jean-Michel Muller, Ioana Paşca et al.
    Pages 85-99
  7. Étienne André, Laurent Fribourg, Romain Soulat
    Pages 100-105
  8. Pascal Cuoq, Benjamin Monate, Anne Pacalet, Virgile Prevosto, John Regehr, Boris Yakobowski et al.
    Pages 120-125
  9. Darren Cofer, Andrew Gacek, Steven Miller, Michael W. Whalen, Brian LaValley, Lui Sha
    Pages 126-140
  10. Anaheed Ayoub, BaekGyu Kim, Insup Lee, Oleg Sokolsky
    Pages 141-146
  11. Heber Herencia-Zapana, Romain Jobredeaux, Sam Owre, Pierre-Loïc Garoche, Eric Feron, Gilberto Perez et al.
    Pages 147-161
  12. Norbert Th. Müller, Christian Uhrhan
    Pages 168-173
  13. Andreas Bauer, Jan-Christoph Küster, Gil Vegliach
    Pages 174-180
  14. Xinxin Liu, Bingtian Xue
    Pages 181-194

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Fourth International Symposium on NASA Formal Methods, NFM 2012, held in Norfolk, VA, USA, in April 2012. The 36 revised regular papers presented together with 10 short papers, 3 invited talks were carefully reviewed and selected from 93 submissions. The topics are organized in topical sections on theorem proving, symbolic execution, model-based engineering, real-time and stochastic systems, model checking, abstraction and abstraction refinement, compositional verification techniques, static and dynamic analysis techniques, fault protection, cyber security, specification formalisms, requirements analysis and applications of formal techniques.

Keywords

cyber security formal techniques formalism model checking symbolic execution

Editors and affiliations

  • Alwyn E. Goodloe
    • 1
  • Suzette Person
    • 1
  1. 1.NASA Langley Research CenterHamptonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-28891-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-28890-6
  • Online ISBN 978-3-642-28891-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Engineering