Journal: ACM SIGSOFT Software Engineering Notes

Volume 10, Issue 4

1 -- 0Dan Craigen, Donald I. Good. Overview of verification systems
2 -- 4David R. Musser. AIDS to hierarchical specification structuring and reusing theorems in AFFIRM-85
5 -- 6Michael K. Smith, Richard M. Cohen. Gypsy verification environment: status
7 -- 14Leo Marcus, Stephen D. Crocker, Jaisook Landauer. SDVS: a system for verifying microcode correctness
15 -- 16Stephen D. Crocker. Engineering requirements for production quality verification systems
17 -- 18Steven T. Eckmann, Richard A. Kemmerer. INATEST: an interactive environment for testing formal specifications
19 -- 25Daniel M. Berry. An Ina Jo® proof manager for the formal development method
26 -- 27Dan Putnam. The VERUS™ design verification system
28 -- 32Ole-Johan Dahl, Olaf Owe. A presentation of the specification and verification project "ABEL"
33 -- 34Dan Craigen, Mark Saaltink. An EVES update
35 -- 36S. Kamal Abdali, Ralph L. London. Exploiting workstations and displays in verification systems
37 -- 40Susan L. Gerhart. Prolog technology as a basis for verification systems
41 -- 43P. Michael Melliar-Smith, John Rushby. The enhanced HDM system for specification and verification
44 -- 47James G. Williams 0002, Charles H. Applebaum. The Practical Verification System Project
48 -- 0Donald I. Good, Robert S. Boyer, J. Strother Moore. A second generation verification environment
49 -- 50James G. Williams. Components of verification technology
51 -- 52Raymond J. Hookway. Verifying Ada programs
53 -- 54D. Cooper. Overview of Theorem Proving
55 -- 59Nachum Dershowitz, David A. Plaisted. Conditional rewriting
60 -- 0Nachum Dershowitz. Rewriting and verification
61 -- 62Brian T. Smith. Position paper to be presented at "Verification workshop III (verkshop III)" to be held in Watsonville, CA. Feb. 18-21, 1985
63 -- 66Deepak Kapur, Paliath Narendran. An equational approach to theorem proving in first-order predicate calculus
67 -- 68Deepak Kapur, G. Sivakumar. RRL: theorem proving environment based on rewriting techniques
69 -- 0Sam Owre. The Sytek theorem prover
70 -- 71William F. Wilson, Sam Owre. Programmable heuristics for theorem provers
72 -- 74Robert S. Boyer, Matt Kaufmann. A prototype theorem-prover for a higher-order functional language
75 -- 0Richard A. Kemmerer. Overview of foundations
76 -- 79Janice I. Glasgow, Glenn H. MacEwen. LUCID: a specification language for distributed systems
80 -- 81Dan Craigen. Some thoughts arising from a language design effort
82 -- 83Mark Saaltink. Relational semantics
84 -- 0Friedrich W. von Henke. Reasoning with Hoare sentences
85 -- 87John McLean. Two dogmas of program specification
87 -- 89. Old-fashioned logic for verification
90 -- 91Dan Putnam. Separating methodology and specification constructs
92 -- 94Mark R. Pixon. Enhancing FDM for the expression of concurrency requirements
95 -- 96Karl N. Levitt, R. Alan Whitehurst. Overview of applications
97 -- 100R. Alan Whitehurst. The need for an integrated design, implementation, verification and testing methodology
101 -- 102Ben Di Vito. Towards a definition of "Beyond AI" verification
102 -- 104Jeannette M. Wing. Beyond functional behavior: combining methods to specify different classes of properties of large systems
104 -- 106John McHugh, Karl A. Nyberg. Ada verification using existing tools
107 -- 0Carl E. Landwehr. Does program verification help?: how much?
108 -- 109Terry C. Vickers Benzel. Verification technology and the A1 criteria
110 -- 0Daniel Davis. Resource abstraction and validation
111 -- 112Carl E. Landwehr. Some lessons from formalizing a security model
113 -- 116Tad Taylor. Verkshop position paper
116 -- 118Norman Proctor. The restricted access processor: an example of formal verification
119 -- 125William Earl Boebert, Richard Y. Kain. The extended access matrix model of computer security
126 -- 129Ruaridh Macdonald. Verifying a real system design: some of the problems
129 -- 130R. Stokes. Some formal method activities in UK industry