Hardware and software : verification and testing ; 8th International Haifa Verification Conference, HVC 2012, Haifa, Israel, November 6-8, 2012. Revised Selected Papers /

Saved in:
Bibliographic Details
Meeting name:International Haifa Verification Conference (8th : 2012 : Haifa, Israel)
Imprint:New York : Springer, [2013]
©2013
Description:1 online resource (xi, 279 pages) : illustrations.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 7857
LNCS sublibrary. SL 2, Programming and software engineering
Lecture notes in computer science ; 7857.
LNCS sublibrary. SL 2, Programming and software engineering.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11079676
Hidden Bibliographic Details
Varying Form of Title:HVC 2012
Other authors / contributors:Biere, Armin, editor.
Nahir, Amir, editor.
Vos, Tanja, editor.
ISBN:9783642396113
3642396119
9783642396106
Digital file characteristics:image files PNG
Notes:Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed July 16, 2013).
Summary:This book constitutes the thoroughly refereed proceedings of the 8th International Haifa Verification Conference, HVC 2012, held in Haifa, Israel in November 2012. The 18 revised full papers presented together with 3 poster presentations were carefully reviewed and selected from 36 submissions. They focus on the future directions of testing and verification for hardware, software, and complex hybrid systems.
Other form:Printed edition: 9783642396106
Standard no.:10.1007/978-3-642-39611-3
Table of Contents:
  • On Behavioral Programming
  • Verifying Real-Time Software Is Not Reasonable: Abstract of Invited Talk
  • SMT in Verification, Modeling, and Testing at Microsoft
  • Reducing Costs While Increasing Quality
  • Special Session on Security Verification
  • Circuit Primitives for Monitoring Information Flow and Enabling Redundancy
  • Formal Analysis of Security Data Paths in RTL Design
  • Precise Detection of Atomicity Violations
  • Proving Mutual Termination of Programs
  • Knowledge Based Transactional Behavior
  • Repair with On-The-Fly Program Analysis
  • Computing Interpolants without Proofs
  • MaxSAT-Based MCS Enumeration
  • Automated Reencoding of Boolean Formulas.