Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Compiler Specification and Verification (Lecture Notes in Computer Science)

Buy

About four years ago David Luckham hinted to me the possibility of verifying a "real" compiler. At that time the idea seemed unrealistic, even absurd. After looking closer at the problem and getting more familiar with the possibilities of the Stanford verifier a verified compiler appeared not so impossible after all. In fact, I was fascinated by the prospect of creating a large, correct piece of software; so this subject became my thesis topic. I am very grateful to David Luckham for suggesting this topic and for his continued advice.

The research has drastically changed my view of verification and programming in general. Analysis and design of programs (even large ones) can be subject to rigorous mathematical treatment - the art of programming may become a science after all. Naturally, the reader will be skeptical, still, I hope to be able to convey some of my fascination.

This text is a revised version of my Ph.D. thesis. The research was done at Stanford University and was supported by the Advanced Research Projects Agency of the Department of Defense, by the National Science Foundation, and by the Studienstiftung des dcutschen Volkes.

This work would have been impossible without the use of the Stanford verifier. I have to thank all members of the Stanford verification group for providing this excellent tool. Don Knuth's text processing system TEX was a most valuable asset for typesetting a manuscript that must be any typist's nightmare.

I would like to thank my thesis committee David Luckham, Zohar Manna, and Susan Owicki for their valuable time, for their careful reading, and for their helpful advice. Friedrich von Hcnkc contributed through numerous discussions and careful perusal of initial drafts of my writing. Bob Boyer, J Moore, Bob Tennent, and Brian Wichman provided valuable comments on the original thesis which have improved the present text. Last but not least I thank my wife Gudrun for her patience and support.

(HTML tags aren't allowed.)

Architecting Dependable Systems (Lecture Notes in Computer Science)
Architecting Dependable Systems (Lecture Notes in Computer Science)
As software systems become more and more ubiquitous, the issues of dependability become more and more critical. Given that solutions to these issues must be planned at the beginning of the design process, it is appropriate that these issues be addressed at the architectural level. This book is inspired by the ICSE 2002 Workshop on Architecting...
BRANDchild: Insights into the Minds of Today's Global Kids: Understanding Their Relationship with Brands
BRANDchild: Insights into the Minds of Today's Global Kids: Understanding Their Relationship with Brands

Tweens (8- to 14-year-olds) comprise a new type of audience. An increasingly powerful and smart consumer group, they not only spent US $300 billion but influenced an astounding US $1.88 trillion spend across the globe last year. They are different from previous generations in every way. They are more likely to have a friend on the other side of...

Network Analysis: Methodological Foundations (Lecture Notes in Computer Science)
Network Analysis: Methodological Foundations (Lecture Notes in Computer Science)
‘Network’ is a heavily overloaded term, so that ‘network analysis’ means different things to different people. Specific forms of network analysis are used in the study of diverse structures such as the Internet, interlocking directorates, transportation systems, epidemic spreading, metabolic pathways, the Web graph,...

Beginning iOS 5 Games Development: Using the iOS SDK for iPad, iPhone and iPod touch (Beginning Apress)
Beginning iOS 5 Games Development: Using the iOS SDK for iPad, iPhone and iPod touch (Beginning Apress)

Game apps on iPhone and now iPad remain one of the most popular type of apps in the Apple iTunes App Store.  Does Angry Birds ring a bell?  What you were once able to do just for the iPhone (and iPod touch) is now possible for the popular iPad, using the new iOS 5 SDK.  

Beginning iOS 5 Games
...

XML in Office 2003: Information Sharing with Desktop XML
XML in Office 2003: Information Sharing with Desktop XML

What do you give the software that has everything?

XML, of course!

Microsoft Office is the most successful productivity product in the history of computers, with over 300 million users around the world. Few of them use all of the features in Office now, so why add...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy