The art of computer programming, volume 1 (3rd ed.): fundamental algorithms
The art of computer programming, volume 1 (3rd ed.): fundamental algorithms
An example of hierarchical design and proof
Communications of the ACM
Use of the concept of transparency in the design of hierarchically structured systems
Communications of the ACM
Guarded commands, nondeterminacy and formal derivation of programs
Communications of the ACM
The treatment of data types in EL1
Communications of the ACM
Monitors: an operating system structuring concept
Communications of the ACM
A technique for software module specification with examples
Communications of the ACM
Certification of algorithm 245 [M1]:treesort 3:proof of algorithms—a new kind of certification
Communications of the ACM
Program development by stepwise refinement
Communications of the ACM
Communications of the ACM
On attaining reliable software for a secure operating system
Proceedings of the international conference on Reliable software
Proceedings of the international conference on Reliable software
Verifying programs which operate on data structures
Proceedings of the international conference on Reliable software
A program verifier
Implications of a virtual memory mechanism for implementing protection in a family of operating systems
SIMULA 67 common base language, (Norwegian Computing Center. Publication)
SIMULA 67 common base language, (Norwegian Computing Center. Publication)
Higher Order Software A Methodology for Defining Software
IEEE Transactions on Software Engineering
Design and specification of microprogrammed computer architectures
MICRO 18 Proceedings of the 18th annual workshop on Microprogramming
Characteristics and functions of software environments: an overview
ACM SIGSOFT Software Engineering Notes
Kit: A Study in Operating System Verification
IEEE Transactions on Software Engineering
The effect of data structures on the logical complexity of programs
Communications of the ACM
ACM Computing Surveys (CSUR)
Specification and verification of the UCLA Unix security kernel
Communications of the ACM
An example of hierarchical design and proof
Communications of the ACM
Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
IEEE Annals of the History of Computing
ICSE '79 Proceedings of the 4th international conference on Software engineering
Specification and implementation of parallel activities on abstract objects
ICSE '79 Proceedings of the 4th international conference on Software engineering
A methodology for the specification of graphical user interface
SIGGRAPH '81 Proceedings of the 8th annual conference on Computer graphics and interactive techniques
Educator's view of structured concepts
ACM '80 Proceedings of the ACM 1980 annual conference
The secret history of information hiding
Software pioneers
ACM SIGPLAN Notices
Flowcharting by stepwise refinement
ACM SIGPLAN Notices
A catalogue of graphical interaction techniques
ACM SIGGRAPH Computer Graphics
Abe: a query language for constructing aggregates-by-example
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
System and network trustworthiness in perspective
Proceedings of the 13th ACM conference on Computer and communications security
Toward a design methodology for DBMS: a software engineering approach
VLDB '77 Proceedings of the third international conference on Very large data bases - Volume 3
Firmware engineering: methods and tools for firmware specification and design
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
The advent of trusted computer operating systems
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
A lemma driven automatic theorem prover for recursive function theory
IJCAI'77 Proceedings of the 5th international joint conference on Artificial intelligence - Volume 1
The functional life cycle model and its automation: USE.IT
Journal of Systems and Software
An integrated approach to safety and security based on systems theory
Communications of the ACM
Hi-index | 48.28 |
A method for describing and structuring programs that simplifies proofs of their correctness is presented. The method formally represents a program in terms of levels of abstraction, each level of which can be described by a self-contained nonprocedural specification. The proofs, like the programs, are structured by levels. Although only manual proofs are described in the paper, the method is also applicable to semi-automatic and automatic proofs. Preliminary results are encouraging, indicating that the method can be applied to large programs, such as operating systems.