Verified Software: Theories, Tools, Experiments

Second International Conference, VSTTE 2008, Toronto, Canada, October 6-9, 2008. Proceedings

  • Editors
  • Natarajan Shankar
  • Jim Woodcock
Conference proceedings VSTTE 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5295)

Table of contents

  1. Front Matter
  2. Keynote Talks (Abstracts)

    1. John C. Reynolds
      Pages 1-1
    2. Moshe Y. Vardi
      Pages 2-2
    3. Madhu Gopinathan, Aditya Nori, Sriram Rajamani
      Pages 4-5
  3. Logics

    1. Rafal Kolanski, Gerwin Klein
      Pages 15-29
  4. Tools

    1. Patrice Chalin, Perry R. James, George Karabotsos
      Pages 70-83
    2. Bruce W. Weide, Murali Sitaraman, Heather K. Harton, Bruce Adcock, Paolo Bucci, Derek Bronish et al.
      Pages 84-98
  5. Case Studies

    1. Dhammika Elkaduwe, Gerwin Klein, Kevin Elphinstone
      Pages 99-114
    2. Yoshifumi Yuasa, Yoshinori Tanabe, Toshifusa Sekizawa, Koichi Takahashi
      Pages 115-129
    3. Greg Dennis, Kuat Yessenov, Daniel Jackson
      Pages 130-145
  6. Methodology

    1. Matthias Daum, Jan Dörrenbächer, Mareike Schmidt, Burkhart Wolff
      Pages 161-176
    2. Anindya Banerjee, Mike Barnett, David A. Naumann
      Pages 177-191
    3. K. Rustan M. Leino, Peter Müller, Angela Wallenburg
      Pages 192-208
  7. Verisoft

    1. Eyad Alkassar, Mark A. Hillebrand, Dirk Leinenbach, Norbert W. Schirmer, Artem Starostin
      Pages 209-224
    2. Eyad Alkassar, Mark A. Hillebrand
      Pages 225-239

About these proceedings

Introduction

This volume contains the proceedings of the second working conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2008, held in Toronto, Canada, in October 2008.

The 16 papers presented together with 4 invited talks were carefully revised and selected for inclusion in the book. This second conference formally inaugurates the Verified Software Initiative (VSI), a fifteen-year, co-operative, international project directed at the scientific challenges of large-scale software verification. The scope of the cooperative effort includes the sharing and interoperability of tools, the alignment of theory and practice, the identification of challenge problems, the construction of benchmark suites, and the execution of large-scale experiments.

Keywords

Action Benchmark Java algorithms bounded verification design methods logic modal logic programming language propositional logic requirements modelling security semantic specification verification

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-87873-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-87872-8
  • Online ISBN 978-3-540-87873-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book