Software-intensive systems are today an integral part of many everyday products. Whilst they provide great benefits regarding ease of use and allow for new applications, they also impose enormous responsibilities. It is vital to ensure that such applicati
This Festschrift was published in honor of Andre Scedrov on the occasion of his 65th birthday. The 11 technical papers and 3 short papers included in this volume show the many transformative discoveries made by Andre Scedrov in the areas of linear logic and structural proof theory; formal reasoning for networked systems; and foundations of information security emphasizing cryptographic protocols. These papers are authored by researchers around the world, including North America, Russia, Europe, and Japan, that have been directly or indirectly impacted by Andre Scedrov. The chapter “A Small Remark on Hilbert's Finitist View of Divisibility and Kanovich-Okada-Scedrov's Logical Analysis of Real-Time Systems” is available open access under a CC BY 4.0 license at link.springer.com.
This book constitutes the refereed proceedings of the 31st International Conference on Logic-Based Program Synthesis and Transformation, LOPSTR 2021, which was held during September 7-8, 2021.* The 8 papers presented in this volume were carefully reviewed and selected from a total of 15 reviewed submissions. Additionally, the book also contains 1 full-length invited talk. *Conference was held as a hybrid event due to the COVID-19 pandemic.
The 14th International Workshop on Logic, Language, Information and Computation focused on foundations of computing and programming; novel computation models and paradigms; broad notions of proof and belief; formal methods in software and hardware development; logical approach to natural language and reasoning; logics of programs, actions, and resources; and foundational aspects of information organization, search, flow, sharing, and protection.
Theimportanceofsafetyandsecurityisgrowingsteadily.Safetyisaqualityc- racteristic that traditionally has been considered to be important in embedded systems, and security is usually an essential property in business applications. There is certainly a tendency to use software-based solutions in safety-critical applications domains, which increases the importance of safety engineering te- niques. These include modelling and analysis techniques as well as appropriate processes and tools. And it is surely correct that the amount of con?dential data that require protection from unauthorized access is growing. Therefore, security is very important. On the one hand, the traditional motivations for addressing safety and security still exist, and their relevance has improved. On the other hand, safety and security requirements occur increasingly in the same system. At present, many software-based systems interact with technical equipment and they communicate, e.g., with users and other systems. Future systems will more and more interact with many other entities (technical systems, people, the en- ronment). In this situation, security problems may cause safety-related failures. It is thus necessary to address safety and security. It is furthermore required to take into account the interactions between these two properties.
This book provides an overview about the open challenges in software verification. Software verification is a branch of software engineering aiming at guaranteeing that software applications satisfy some requirements of interest. Over the years, the software verification community has proposed and considered several techniques: abstract interpretation, data-flow analysis, type systems, model checking are just a few examples. The theoretical advances have been always motivated by practical challenges that have led to an equal evolution of both these sides of software verification. Indeed, several verification tools have been proposed by the research community and any software application, in order to guarantee that certain software requirements are met, needs to integrate a verification phase in its life cycle, independently of the context of application or software size. This book is aimed at collecting contributions discussing recent advances in facing open challenges in software verification, relying on a broad spectrum of verification techniques. This book collects contributions ranging from theoretical to practical arguments, and it is aimed at both researchers in software verification and their practitioners.
This book constitutes the proceedings of the 41st International Conference on Computer Safety, Reliability and Security, SAFECOMP 2022, which took place in Munich, Germany, in September 2022. The 24 full papers included in this volume were carefully reviewed and selected from 93 submissions. SafeComp has contributed to the progress of the state-of-the-art in dependable application of computers in safety-related and safety-critical systems. SafeComp is an annual event covering the state-of-the-art, experience and new trends in the areas of safety, security and reliability of critical computer applications.
Human errors, as well as deliberate sabotage, pose a considerable danger to passengers riding on the modern railways and have created disastrous consequences. To protect civilians against both intentional and unintentional threats, rail transportation has become increasingly automated. Railway Safety, Reliability, and Security: Technologies and Systems Engineering provides engineering students and professionals with a collection of state-of-the-art methodological and technological notions to support the development and certification of real-time safety-critical railway control systems, as well as the protection of rail transportation infrastructures.
Crispin Wright is widely recognised as one of the most important and influential analytic philosophers of the twentieth and twenty-first centuries. This volume is a collective exploration of the major themes of his work in philosophy of language, philosophical logic, and philosophy of mathematics. It comprises specially written chapters by a group of internationally renowned thinkers, as well as four substantial responses from Wright. In these thematically organized replies, Wright summarizes his life's work and responds to the contributory essays collected in this book. In bringing together such scholarship, the present volume testifies to both the enormous interest in Wright's thought and the continued relevance of Wright's seminal contributions in analytic philosophy for present-day debates;
This volume contains the papers presented at WoLLIC 2010: 17th Workshop on Logic, Language, Information and Computation held during July 6–9, 2010, on the campus of Universidade de Bras ́ ?lia (UnB), Brazil. The Workshop on Logic, Language, Information and Computation (WoL- LIC) is an annual event, meeting every year since 1994, which aims at fostering interdisciplinary research in pure and applied logic. The idea is to have a forum which is large enough in the number of possible interactions between logic and the sciences related to information and computation, and yet is small enough to allow for concrete and useful interaction among participants. The present volume contains 13 contributed papers that were selected from among 32 submissions after a rigorous review by the Program Committee. Each submission was reviewed by at least two, and on average three, Program C- mittee members. This volume also containspapersor abstractsthat relateto the seven invited talks presented at the workshop. Between them, these papers give a snapshot of some fascinating work taking place at the frontiers between computation, logic, and linguistics. We are grateful to all the people who made this meeting possible and are responsible for its success: the members of the Program Committee and the external reviewers, the invited speakers, the contributors, and the people who were involved in organizing the workshop.