Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modular Compiler Verification: A Refinement-Algebraic Approach Advocating Stepwise Abstraction

Buy

After 40 years of practice and theory in compiler construction and 30 years of experience and teaching in software engineering we still observe that safetycritical high-level language programs are certified only together with the corresponding machine code. The reason is that certification institutions do not trust any compiler. And they are quite right: whereas errors detected in processor hardware are generally perceived as sensations, errors in software, even in system software, are commonplace.

It is high time to reverse this trend. Computer scientists should concentrate their abilities, experiences, and insights on the safe mastery of realistic system software. This particularly concerns realistic compilers for realistic programming languages running on hardware processors, as correct compilers play a central role in the construction of trustworthy application and system programs. Both application programmers and system software engineers need trusted development environments that permit them to concentrate on software specification and high-level implementation instead of wasting their time again and again with compilation problems and machine code inspection.

This book presents the verified design of a code generator translating a prototypic real-time programming language to an actual microprocessor, the Inmos Transputer. Unlike most other work on compiler verification, and with particular emphasis on modularity, it systematically covers correctness of translation down to actual machine code, a necessity in the area of safety-critical systems. The formal framework provided as well as the novel proof-engineering ideas incorporated in the verified code generator are also of relevance for software design in general.

(HTML tags aren't allowed.)

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Essential Urology: A Guide to Clinical Practice (Current Clinical Urology)
Essential Urology: A Guide to Clinical Practice (Current Clinical Urology)

Leading urologists and expert specialists review and summarize for family practitioners the latest thinking about how best to evaluate, diagnose, and treat all the most commonly encountered urological conditions. Topics discussed range from urinary tract infections in children and adults to the evaluation and treatment of hematuria, kidney...

Network Administrator Street Smarts: A Real World Guide to CompTIA Network+ Skills
Network Administrator Street Smarts: A Real World Guide to CompTIA Network+ Skills
Develop the skills you need in the real world

 

Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at network administration, with key information organized around the actual day-to-day tasks, scenarios, and challenges...


Mac OS X: The Complete Reference
Mac OS X: The Complete Reference

This book is complete: my checklists and FileMaker databases have cross-indexed features, preferences, and the applications that ship with Mac OS X, to make certain that everything shows up somewhere in the book. It has been revised against the second update—Mac OS X 10.0.2. We have tried to include screen shots of almost every feature,...

Talend for Big Data
Talend for Big Data

If you want to start working on big data projects fast, this is the guide you've been looking for. Delve deep into Talend and discover how just how easily you can revolutionize your data handling and presentation.

Overview

  • Write complex processing job codes easily with the help of clear and step by...
Pattern Recognition and Image Preprocessing (Signal Processing and Communication, 14)
Pattern Recognition and Image Preprocessing (Signal Processing and Communication, 14)

Describing non-parametric and parametric theoretic classification and the training of discriminant functions, this second edition includes new and expanded sections on neural networks, Fisher's discriminant, wavelet transform, and the method of principal components. It contains discussions on dimensionality reduction and feature selection, novel...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy