Narrow your search

Library

KU Leuven (7)

ULiège (6)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

UGent (4)

ULB (4)

VIVES (4)

VUB (4)

More...

Resource type

book (14)


Language

English (14)


Year
From To Submit

2019 (4)

2009 (2)

2007 (2)

1999 (2)

1992 (3)

More...
Listing 1 - 10 of 14 << page
of 2
>>
Sort by

Book
Theoretical aspects of semantics-based language implementation
Author:
Year: 1990 Publisher: Aarhus Aarhus university. Computer science department

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Principles of Security and Trust : 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings
Authors: --- ---
ISBN: 3030171388 303017137X Year: 2019 Publisher: Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is Open Access under a CC BY licence.

Keywords

Computer security. --- Software engineering. --- Artificial intelligence. --- Computer system performance. --- Computer science. --- Information theory. --- Systems and Data Security. --- Software Engineering/Programming and Operating Systems. --- Artificial Intelligence. --- System Performance and Evaluation. --- Computing Milieux. --- Theory of Computation. --- Communication theory --- Communication --- Cybernetics --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer system failures. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Calculators --- Cyberspace --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Failures --- Computer science --- Computer security --- Software engineering --- Artificial intelligence --- Computer system failures

Two-level functional languages
Authors: ---
ISBN: 0521403847 Year: 1992 Publisher: Cambridge Cambridge University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Semantics with applications : a formal introduction
Authors: ---
ISBN: 0471929808 9780471929802 Year: 1992 Publisher: Chichester : John Wiley,

Semantics with Applications: An Appetizer
Authors: ---
ISBN: 1846286913 1846286921 9781846286919 Year: 2007 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Semantics will have an important role to play in the future development of software systems and domain specific languages, and there is a real need for an introductory book that presents the fundamental ideas behind these approaches; stresses their relationship by formulating and proving the relevant theorems; and illustrates the applications of semantics in computer science. Written out of a tradition that places special emphasis on operational semantics, denotational semantics and axiomatic semantics, this book investigates the relationship between the various methods and describes some of the main ideas used, illustrating these via interesting applications. Historically important application areas are used together with some exciting potential applications including: Validating prototype implementations of programming languages Verifying program analyses that are part of more advanced implementations of programming languages Verifying security analyses Verifying useful program properties including information about execution time. This is an introductory text that should serve as an appetizer to the whole area of semantics with applications.

Semantics with applications : an Appetizer
Authors: ---
ISBN: 9781846286926 9781846286919 1846286913 Year: 2007 Publisher: London: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Semantics will have an important role to play in the future development of software systems and domain specific languages, and there is a real need for an introductory book that presents the fundamental ideas behind these approaches; stresses their relationship by formulating and proving the relevant theorems; and illustrates the applications of semantics in computer science. Written out of a tradition that places special emphasis on operational semantics, denotational semantics and axiomatic semantics, this book investigates the relationship between the various methods and describes some of the main ideas used, illustrating these via interesting applications. Historically important application areas are used together with some exciting potential applications including: Validating prototype implementations of programming languages Verifying program analyses that are part of more advanced implementations of programming languages Verifying security analyses Verifying useful program properties including information about execution time. This is an introductory text that should serve as an appetizer to the whole area of semantics with applications.


Book
Formal Methods : An Appetizer
Authors: ---
ISBN: 3030051552 3030051560 9783030051556 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This textbook is an introduction to the use of formal methods ranging from semantics of key programming constructs to techniques for the analysis and verification of programs. The authors use program graphs as the mechanism for representing the control structure of programs in order to find a balance between generality and conceptual complexity. The early chapters on program graphs and the Guarded Commands language are sufficient introduction for most readers to then enjoy a plug-and-play approach to the remaining chapters. These explain formal methods for analysing the behaviour of programs in various ways ranging from verification, via program analysis and language-based security, to model checking. The remaining chapters present language extensions with procedures and concurrency and cover their semantics. The book is suitable for advanced undergraduate and graduate courses in software development, and the text is supported throughout with exercises of varying grades of difficulty. The authors have developed an online learning environment that allows students to create examples beyond those covered in the main text, and in the book appendices they present programming projects aimed at implementing central parts of the development using the functional language F#.


Book
Two-level functional languages
Authors: ---
ISBN: 0511526571 Year: 1992 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The authors describe here a framework in which the type notation of functional languages is extended to include a notation for binding times (that is run-time and compile-time) that distinguishes between them. Consequently the ability to specify code and verify program correctness can be improved. Two developments are needed, the first of which introduces the binding time distinction into the lambda calculus, in a manner analogous with the introduction of types into the untyped lambda calculus. Methods are also presented for introducing combinators for run-time. The second concerns the interpretation of the resulting language, which is known as the mixed lambda-calculus and combinatory logic. The notion of 'parametrized semantics' is used to describe code generation and abstract interpretation. The code generation is for a simple abstract machine designed for the purpose; it is close to the categorical abstract machine. The abstract interpretation focuses on a strictness analysis that generalises Wadler's analysis for lists.

Principles of program analysis
Authors: --- ---
ISBN: 3540654100 3642084745 3662038110 9783540654100 Year: 1999 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Program analysis concerns static techniques for computing reliable approximate information about the dynamic behaviour of programs. Applications include compilers (for code improvement), software validation (for detecting errors in algorithms or breaches of security) and transformations between data representation (for solving problems such as the Y2K problem). This book is unique in giving an overview of the four major approaches to program analysis: data flow analysis, constraint based analysis, abstract interpretation, and type and effect systems. The presentation demonstrates the extensive similarities between the approaches; this will aid the reader in choosing the right approach and in enhancing it with insights from the other approaches. The book covers basic semantic properties as well as more advanced algorithmic techniques. The book is aimed at M.Sc. and Ph.D. students but will be valuable also for experienced researchers and professionals.

Keywords

Computer programming. --- Computer programs. --- Programmation (Informatique) --- Logiciels --- Computer programming --- Computer programs --- 681.3*F32 --- Computer program files --- Files, Computer program --- Program files, Computer --- Programs, Computer --- Computer files --- Computer software --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Semantics of programming languages: algebraic approaches to semantics denotational semantics operational semantics (Logics and meanings of programs)--See also {681.3*D31} --- Programming --- 681.3*F32 Semantics of programming languages: algebraic approaches to semantics denotational semantics operational semantics (Logics and meanings of programs)--See also {681.3*D31} --- 681.3*F32 Semantics of programming languages: algebraic approaches to semantics; denotational semantics; operational semantics (Logics and meanings of programs)--See also {681.3*D31} --- Semantics of programming languages: algebraic approaches to semantics; denotational semantics; operational semantics (Logics and meanings of programs)--See also {681.3*D31} --- programmeren (informatica) --- Computer science --- algoritmen --- Computer logic. --- Programming languages (Electronic computers). --- Software engineering. --- Logics and Meanings of Programs. --- Programming Languages, Compilers, Interpreters. --- Software Engineering. --- Computer software engineering --- Engineering --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Languages, Artificial --- Computer science logic --- Logic, Symbolic and mathematical


Book
Trustworthy Global Computing : 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers
Authors: --- ---
ISBN: 3642009441 364200945X Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Symposium on Trustworthy Global Computing, TGC 2008 held in Barcelona, Spain, in November 2008. The 12 revised papers presented together with one invited paper were carefully selected from 26 submissions during two rounds of reviewing and improvement. The TGC 2008 symposium papers focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their behavior and properties in models of computation that incorporate code and data mobility over distributed networks with highly dynamic topologies and heterogeneous devices.

Keywords

Computer security --- Computer networks --- Computer software --- Computer Science --- Engineering & Applied Sciences --- Security measures --- Validation --- Verification --- Information Technology --- Software Engineering --- Software protection --- Reliability --- Computer software protection --- Protection of software --- Computer science. --- Computer communication systems. --- Computer programming. --- Software engineering. --- Programming languages (Electronic computers). --- Computer security. --- Computer logic. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Computer Communication Networks. --- Programming Techniques. --- Programming Languages, Compilers, Interpreters. --- Logics and Meanings of Programs. --- Computer science logic --- Logic, Symbolic and mathematical --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computer software engineering --- Engineering --- Electronic computer programming --- Programming (Electronic computers) --- Coding theory --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Programming --- Distributed processing --- Access control --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Data protection. --- Computer networks. --- Compilers (Computer programs). --- Data and Information Security. --- Compilers and Interpreters. --- Computer Science Logic and Foundations of Programming. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Compiling programs (Computer programs) --- Computer programs --- Programming software --- Systems software

Listing 1 - 10 of 14 << page
of 2
>>
Sort by