Please use this identifier to cite or link to this item: http://dspace.mediu.edu.my:8181/xmlui/handle/1721.1/6688
Full metadata record
DC FieldValueLanguage
dc.creatorShrobe, Howard E.-
dc.date2004-10-08T20:37:51Z-
dc.date2004-10-08T20:37:51Z-
dc.date1978-01-01-
dc.date.accessioned2013-10-09T02:46:28Z-
dc.date.available2013-10-09T02:46:28Z-
dc.date.issued2013-10-09-
dc.identifierAIM-456-
dc.identifierhttp://hdl.handle.net/1721.1/6688-
dc.identifier.urihttp://koha.mediu.edu.my:8181/xmlui/handle/1721-
dc.descriptionThe Floyd-Hoare methodology completely dominates the field of program verification and has contributed much to our understanding of how programs might be analyzed. Useful but limited verifiers have been developed using Floyd-Hoare techniques. However, it has long been known that it is difficult to handle side effects on shared data structures within the Floyd-Hoare framework. Most examples of successful Floyd-Hoare axioms for assignment to complex data structures, similar statements have been used by London. This paper demonstrates an error in these formalizations and suggests a different style of verification.-
dc.format8997805 bytes-
dc.format6678766 bytes-
dc.formatapplication/postscript-
dc.formatapplication/pdf-
dc.languageen_US-
dc.relationAIM-456-
dc.titleFloyd-Hoare Verifiers "Considered Harmful"-
Appears in Collections:MIT Items

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.