Computer Aided Verification: 20th International Conference, Cav 2008 Princeton, Nj, Usa, July 7-14, 2008, Proceedings 2008 Edition Contributor(s): Gupta, Aarti (Editor), Malik, Sharad (Editor) |
|
ISBN: 3540705430 ISBN-13: 9783540705437 Publisher: Springer OUR PRICE: $132.05 Product Type: Paperback - Other Formats Published: June 2008 Annotation: This book constitutes the refereed proceedings of the 20th International Conference on Computer Aided Verification, CAV 2008, held in Princeton, NJ, USA, in July 2008. The 33 revised full papers presented together with 14 tool papers and 2 invited papers and 4 invited tutorials were carefully reviewed and selected from 104 regular paper and 27 tool paper submissions. The papers are organized in topical sections on concurrency, memory consistency, abstraction/refinement, hybrid systems, dynamic verification, modeling and specification formalisms, decision procedures, program verification, program and shape analysis, security and program analysis, hardware verification, model checking, space efficient algorithms, and model checking. |
Additional Information |
BISAC Categories: - Computers | Logic Design - Computers | Software Development & Engineering - General - Mathematics | Logic |
Dewey: 004.210 |
Series: Lecture Notes in Computer Science |
Physical Information: 1.3" H x 6" W x 9.2" (1.85 lbs) 558 pages |
Descriptions, Reviews, Etc. |
Publisher Description: This book constitutes the refereed proceedings of the 20th International Conference on Computer Aided Verification, CAV 2008, held in Princeton, NJ, USA, in July 2008. The 33 revised full papers presented together with 14 tool papers and 2 invited papers and 4 invited tutorials were carefully reviewed and selected from 104 regular paper and 27 tool paper submissions. The papers are organized in topical sections on concurrency, memory consistency, abstraction/refinement, hybrid systems, dynamic verification, modeling and specification formalisms, decision procedures, program verification, program and shape analysis, security and program analysis, hardware verification, model checking, space efficient algorithms, and model checking. |