So-called "guarded commands" are introduced as a building block for alternative and repetitive constructs that allow non-deterministic program components for which at least the activity evoked, but possibly even the final state, is not necessarily uniquely determined by the initial state. For the formal derivation of programs expressed in terms of these constructs, a calculus will be shown
The refinement calculus for logic programs consists of a wide-spectrum language and a notion of refi...
This paper defines a simple guarded-command–like language and its semantics. The language is used as ...
Expression evaluation in programming languages is normally assumed to be deterministic; however, if ...
So-called "guarded commands" are introduced as a building block for alternative and repetitive const...
So-called "guarded commands" are introduced as a building block for alternative and repetitive const...
So-called "guarded commands " are introduced as a building block for alternative a...
The standard approach to the specification of a secure system is to present a (usually state-hased) ...
A runtime monitor is a program that runs in parallel with an un-trusted application and examines act...
Formal methods provide a means of reasoning about computer programs in order to prove correctness cr...
A large part of the effort in formal program developments is expended on repeating the same derivati...
AbstractFor an arbitrary programming language with nondeterminism to be implementable, the existence...
Dijkstra's language of guarded commands is extended with recursion and transformed into algebra. The...
Language-based and process calculi-based information security are well developed fields of computer ...
Abstract. We consider the problem of defining an appropriate notion of non-interference (NI) for det...
The refinement calculus for logic programs consists of a wide-spectrum language and a notion of refi...
This paper defines a simple guarded-command–like language and its semantics. The language is used as ...
Expression evaluation in programming languages is normally assumed to be deterministic; however, if ...
So-called "guarded commands" are introduced as a building block for alternative and repetitive const...
So-called "guarded commands" are introduced as a building block for alternative and repetitive const...
So-called "guarded commands " are introduced as a building block for alternative a...
The standard approach to the specification of a secure system is to present a (usually state-hased) ...
A runtime monitor is a program that runs in parallel with an un-trusted application and examines act...
Formal methods provide a means of reasoning about computer programs in order to prove correctness cr...
A large part of the effort in formal program developments is expended on repeating the same derivati...
AbstractFor an arbitrary programming language with nondeterminism to be implementable, the existence...
Dijkstra's language of guarded commands is extended with recursion and transformed into algebra. The...
Language-based and process calculi-based information security are well developed fields of computer ...
Abstract. We consider the problem of defining an appropriate notion of non-interference (NI) for det...
The refinement calculus for logic programs consists of a wide-spectrum language and a notion of refi...
This paper defines a simple guarded-command–like language and its semantics. The language is used as ...
Expression evaluation in programming languages is normally assumed to be deterministic; however, if ...