skip to main content
article
Free access

Recent SRI work in verification

Published: 01 July 1981 Publication History
First page of PDF

References

[1]
R. Boyer and J Strother Moore. A Verification Condition Generator for Fortran. Technical Report CSL-103, Computer Science Laboratory, SRI International, June, 1980.
[2]
R. Boyer and J Moore. The Mechanical Verification of a Fortran Square Root Program. Technical Report, SRI International, January, 1981.
[3]
R. Boyer and J Moore. MJRTY - A Fast Majority Vote Algorithm. Technical Report, SRI International, February, 1981.
[4]
Robert Boyer and J Strother Moore. A Computational Logic. Academic Press, 1979.
[5]
Burstall, R. M., and Goguen, J. A. The Semantics of CLEAR, a Specification Language. In Proceedings of the 1979 Copenhagen Winter School on Abstract Software Specification, Lecture Notes in Computer Science, volume 86, pages 292--332. Springer-Verlag, 1980.
[6]
Burstall, R. M. and Goguen, J. A. An Informal Introduction to CLEAR, a Specification Language. In Boyer, R. and Moore, J, editor, The Correctness Problem in Computer Science, Academic Press, 1981.
[7]
W. D. Elliott, Evaluation of SPECIAL. in preparation.
[8]
B. Elspas. Rugged Jovial Environment. Interim Report 2 for Rome Air Development Center, Contract F30602-78-C-0031, SRI International, Computer Science Laboratory, January, 1980.
[9]
Goguen, J. A. and Burstall, R. M. An Ordinary Design. Technical Report, SRI International, 1980. Draft report.
[10]
Goguen, J. A., and Burstall, R. M. CAT, a System for the Structured Elaboration of Correct Programs from Structured Specifications. Technical Report, SRI, International; Computer Science Lab, 1980. Based on unpublished working draft, UCLA and SRI, 1979.
[11]
Goguen, J. A. and Meseguer, J. Completeness of Many-sorted Equational Logic. to appear, SIGACT Newsletter. 1981.
[12]
Goguen, J. A. and Parsaye-Ghomi, K. Algebraic Denotational SEmantics using Parameterized Abstract Modules. Proceedings, International Conference on Formalizing Programming Concepts, Peniscola, Spain. 1981.
[13]
Goguen, J. A. Thoughts on Program Specification, Design and Verification. ACM SIGSOFT Software Engineering Notes 5(3), 1980.
[14]
Goguen, J. A. How to Prove Algebraic Inductive Hypotheses without Induction: with applications to the correctness of data type representations. In W. Bibel and R. Kowalski, editor, Proceedings, 5th Conference on Automated Deduction, pages 356--373. Springer-Verlag, Lecture Notes in Computer Science, volume 87, 1980.
[15]
Goldberg, J. SIFT: A Provable Fault-Tolerant Computer for Aircraft Flight Control. 1980. Presented at the 8th World Computer Congress, IFIP Congress 80, Tokyo, Japan, October 1980.
[16]
J. Goldberg, L. Lamport, W. H. Kautz, P. G. Neumann, R. E. Shostak, and M. C. Pease. Formal Techniques for Fault-Tolerance in Distributed Data Processing (DDP). Technical Report, SRI International, May, 1980. Final Report, SRI Project 7242.
[17]
Lamport, L. and Owicki, S. Proving Liveness Properties of Concurrent Programs. 1980.
[18]
L. Lamport, W. H. Kautz, P. G. Neumann, R. L. Schwartz, P. M. Melliar-Smith. Formal Techniques for Fault Tolerance in Distributed Data Processing. Final Report for Rome Air Development Center, SRI International, Computer Science Laboratory, April, 1981.
[19]
L. Lamport, R. Shostak and M. Pease. The Byzantine Generals Problem. Technical Report, SRI International, March, 1980.
[20]
K. Levitt, P. Neumann and L. Robinson. The SRI Hierarchical Development Methodology (HDM) and its Application to the Development of Secure Software. National Bureau of Standards, Computer Science and Technology. July, 1980.
[21]
K. N. Levitt and P. G. Neumann. An Overview of SRI Work in Verification. ACM SIGSOFT Software Engineering Notes 5(3):9--11, July, 1980.
[22]
Melliar-Smith, P. M. and Schwartz, R. L. Hierarchical Specification of the SIFT Fault-Tolerant Flight-Control System. 1981.
[23]
M. Moriconi and R. L. Schwartz. Automatic construction of verification condition generators from Hoare logics. Proceedings of ICALP 81, Springer-Verlag Lecture Notes in Computer Science, Haifa, Israel, July 1981. Also available as SRI International Computer Science Laboratory report CSL-125. See also Automatic Construction of Verification Condition Generators, M. Moriconi, L. Flon and R. Schwartz, CSL Report, 1980.
[24]
P. G. Neumann. Experiences with a Formal Methodology for Software Development. In International Seminar on Software Engineering Applications (cosponsored by Systems and Management, and SRI), Capri, Italy, October, 1980.
[25]
Parsaye-Ghomi, K. Higher Order Data Types. PhD thesis, UCLA, Computer Science Department, 1981.
[26]
M. Pease, R. Shostak, and L. Lamport. Reaching Agreement in the Presence of Faults. JACM 27(2):228--234, April, 1980.
[27]
Schwartz, R. L. and Melliar-Smith, P. M. Temporal Logic Specification of Distributed Systems. In Proceedings of the Second International Conference on Distributed Systems), INRIA, 1981.
[28]
R. Shostak, A New Theorem Prover for Unquantified Formulas. In preparation, 1981.
[29]
B. Silverberg. An Overview of the SRI Hierarchical Development Methodology. Technical Report, SRI International, July, 1980.
[30]
C. Weinstock. SIFT: System Design and Implementation. In Proceedings of FTCS-10, pages 75--77, October, 1980.

Cited By

View all
  • (1982)Cryptography and data securityundefinedOnline publication date: 1-Jan-1982

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 6, Issue 3
July 1981
104 pages
ISSN:0163-5948
DOI:10.1145/1010832
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1981
Published in SIGSOFT Volume 6, Issue 3

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)7
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (1982)Cryptography and data securityundefinedOnline publication date: 1-Jan-1982

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media