Intelligent systems and formal methods in software engineering

被引:13
作者
Beckert, Bernhard [1 ]
Hoare, Tony
Hahnle, Reiner
Smith, Douglas R.
Green, Cordell
Ranise, Silvio
Tinelli, Cesare
Ball, Thomas
Rajamani, Sriram K.
机构
[1] Univ Koblenz, Koblenz, Germany
[2] INRA, Loria Lab, CNRS, Paris, France
[3] Univ Nancy, Nancy, France
[4] Microsoft Res, Cambridge, England
[5] Univ Oxford, Oxford OX1 2JD, England
[6] Univ Iowa, Iowa City, IA 52242 USA
[7] Chalmers, Dept Comp Sci, S-41296 Gothenburg, Sweden
[8] Microsoft Res, Redmond, WA USA
[9] Kestrel Inst, Palo Alto, CA USA
[10] Microsoft Res India, Bangalore, Karnataka, India
关键词
D O I
10.1109/MIS.2006.117
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The various developments in the field of software engineering and various efforts to enhance software architecture are presented. A Grand Challenge is a scientific project that an international team of scientists coordinates and carries out over 10 years or more. It has been planned to reactivate the program verifier challenge and solve it by concerted collaborative and competitive efforts. It has been estimated that the cost of software error to the world's economies are in the region of US$ 100 billion a year. The total cost of research over a period of 10 years is $ 1 billion, shared among all participating nations. There are various verification methods that detect errors to protect software from virus attack. The main scientific risk to the project is that methods of computer generation and checking of proofs continue to require skilled human intervention.
引用
收藏
页码:71 / 81
页数:11
相关论文
共 15 条
[1]  
ARMANDO A, 2003, INFORM COMPUTATI JUN, P140
[2]  
Ball T., 2006, Operating Systems Review, V40, P73, DOI 10.1145/1218063.1217943
[3]  
BECKER M, 2003, PLANWARE, V2
[4]  
Beckert B., 2006, LNCS, V4334
[5]  
Brucker A. D., 2005, LNCS, V3997, P87
[6]  
COGLIO A, 2003, P 5 ECOOP WORKSH FOR
[7]   A derivation system for security protocols and its logical formalization [J].
Datta, A ;
Derek, A ;
Mitchell, JC ;
Pavlovic, D .
16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, :109-125
[8]  
Kaufmann M., 2000, COMPUTER AIDED REASO
[9]  
KING JC, 1969, THESIS CARNEGIE I TE
[10]  
Nelson G., 1979, ACM Transactions on Programming Languages and Systems, V1, P245, DOI 10.1145/357073.357079