Leveraging applications of formal methods, verification and validation Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2008
Schriftenreihe:Communications in computer and information science 17
Schlagworte:
Online-Zugang:BTU01
FHM01
UBG01
UBT01
UBY01
UBR01
UPA01
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000 cb4500
001 BV035223708
003 DE-604
005 20150304
006 a |||| 10|||
007 cr|uuu---uuuuu
008 081219s2008 gw |||| o||u| ||||||eng d
016 7 |a 990520978  |2 DE-101 
020 |a 9783540884798  |c Online  |9 978-3-540-88479-8 
024 7 |a 10.1007/978-3-540-88479-8  |2 doi 
035 |a (OCoLC)724040123 
035 |a (DE-599)DNB990520978 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-473  |a DE-706  |a DE-M347  |a DE-703  |a DE-634  |a DE-355  |a DE-739 
082 0 |a 005.12  |2 22/ger 
084 |a ST 233  |0 (DE-625)143620:  |2 rvk 
084 |a 004  |2 sdnb 
245 1 0 |a Leveraging applications of formal methods, verification and validation  |b Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings  |c Tiziana Margaria ; Bernhard Steffen (ed.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2008 
300 |a 1 Online-Ressource (XIV, 869 S.)  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Communications in computer and information science  |v 17 
650 0 7 |a Programmverifikation  |0 (DE-588)4135576-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Programmanalyse  |0 (DE-588)4175841-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Systemanalyse  |0 (DE-588)4116673-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Systementwurf  |0 (DE-588)4261480-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Verifikation  |0 (DE-588)4135577-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Softwareentwicklung  |0 (DE-588)4116522-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Formale Methode  |0 (DE-588)4333722-3  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2008  |z Sani  |2 gnd-content 
689 0 0 |a Softwareentwicklung  |0 (DE-588)4116522-6  |D s 
689 0 1 |a Formale Methode  |0 (DE-588)4333722-3  |D s 
689 0 |5 DE-604 
689 1 0 |a Programmanalyse  |0 (DE-588)4175841-9  |D s 
689 1 1 |a Formale Methode  |0 (DE-588)4333722-3  |D s 
689 1 |5 DE-604 
689 2 0 |a Programmverifikation  |0 (DE-588)4135576-3  |D s 
689 2 1 |a Formale Methode  |0 (DE-588)4333722-3  |D s 
689 2 |5 DE-604 
689 3 0 |a Systementwurf  |0 (DE-588)4261480-6  |D s 
689 3 1 |a Systemanalyse  |0 (DE-588)4116673-5  |D s 
689 3 2 |a Verifikation  |0 (DE-588)4135577-5  |D s 
689 3 3 |a Formale Methode  |0 (DE-588)4333722-3  |D s 
689 3 |5 DE-604 
700 1 |a Margaria, Tiziana  |e Sonstige  |4 oth 
700 1 |a Steffen, Bernhard  |d 1958-  |e Sonstige  |0 (DE-588)1054357390  |4 oth 
711 2 |a ISoLA  |n 3  |d 2008  |c Sani  |j Sonstige  |0 (DE-588)10360259-8  |4 oth 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-3-540-88478-1 
830 0 |a Communications in computer and information science  |v 17  |w (DE-604)BV041227480  |9 17 
856 4 0 |u https://doi.org/10.1007/978-3-540-88479-8  |x Verlag  |3 Volltext 
912 |a ZDB-2-SCS 
999 |a oai:aleph.bib-bvb.de:BVB01-017029763 
966 e |u https://doi.org/10.1007/978-3-540-88479-8  |l BTU01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-88479-8  |l FHM01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-88479-8  |l UBG01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-88479-8  |l UBT01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-88479-8  |l UBY01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-88479-8  |l UBR01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-88479-8  |l UPA01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-UBG_katkey 2584309
DE-BY-UBG_local_url https://doi.org/10.1007/978-3-540-88479-8
Verlag
_version_ 1811359478586540033
any_adam_object
author_GND (DE-588)1054357390
building Verbundindex
bvnumber BV035223708
classification_rvk ST 233
collection ZDB-2-SCS
ctrlnum (OCoLC)724040123
(DE-599)DNB990520978
dewey-full 005.12
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.12
dewey-search 005.12
dewey-sort 15.12
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-540-88479-8
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03532nmm a2200769 cb4500</leader><controlfield tag="001">BV035223708</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150304 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">081219s2008 gw |||| o||u| ||||||eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">990520978</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540884798</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-540-88479-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-540-88479-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)724040123</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB990520978</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.12</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 233</subfield><subfield code="0">(DE-625)143620:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Leveraging applications of formal methods, verification and validation</subfield><subfield code="b">Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings</subfield><subfield code="c">Tiziana Margaria ; Bernhard Steffen (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 869 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">17</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmanalyse</subfield><subfield code="0">(DE-588)4175841-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systemanalyse</subfield><subfield code="0">(DE-588)4116673-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systementwurf</subfield><subfield code="0">(DE-588)4261480-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="z">Sani</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Programmanalyse</subfield><subfield code="0">(DE-588)4175841-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Systementwurf</subfield><subfield code="0">(DE-588)4261480-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Systemanalyse</subfield><subfield code="0">(DE-588)4116673-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Margaria, Tiziana</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Steffen, Bernhard</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1054357390</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISoLA</subfield><subfield code="n">3</subfield><subfield code="d">2008</subfield><subfield code="c">Sani</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10360259-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-540-88478-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in computer and information science</subfield><subfield code="v">17</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">17</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-540-88479-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017029763</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-88479-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-88479-8</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-88479-8</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-88479-8</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-88479-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-88479-8</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-88479-8</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2008 Sani gnd-content
genre_facet Konferenzschrift 2008 Sani
id DE-604.BV035223708
illustrated Illustrated
index_date 2024-09-19T15:27:00Z
indexdate 2024-09-27T16:20:28Z
institution BVB
institution_GND (DE-588)10360259-8
isbn 9783540884798
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-017029763
oclc_num 724040123
open_access_boolean
owner DE-473
DE-BY-UBG
DE-706
DE-M347
DE-703
DE-634
DE-355
DE-BY-UBR
DE-739
owner_facet DE-473
DE-BY-UBG
DE-706
DE-M347
DE-703
DE-634
DE-355
DE-BY-UBR
DE-739
physical 1 Online-Ressource (XIV, 869 S.) Ill., graph. Darst.
psigel ZDB-2-SCS
publishDate 2008
publishDateSearch 2008
publishDateSort 2008
publisher Springer
record_format marc
series Communications in computer and information science
series2 Communications in computer and information science
spellingShingle Leveraging applications of formal methods, verification and validation Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings
Communications in computer and information science
Programmverifikation (DE-588)4135576-3 gnd
Programmanalyse (DE-588)4175841-9 gnd
Systemanalyse (DE-588)4116673-5 gnd
Systementwurf (DE-588)4261480-6 gnd
Verifikation (DE-588)4135577-5 gnd
Softwareentwicklung (DE-588)4116522-6 gnd
Formale Methode (DE-588)4333722-3 gnd
subject_GND (DE-588)4135576-3
(DE-588)4175841-9
(DE-588)4116673-5
(DE-588)4261480-6
(DE-588)4135577-5
(DE-588)4116522-6
(DE-588)4333722-3
(DE-588)1071861417
title Leveraging applications of formal methods, verification and validation Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings
title_auth Leveraging applications of formal methods, verification and validation Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings
title_exact_search Leveraging applications of formal methods, verification and validation Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings
title_full Leveraging applications of formal methods, verification and validation Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings Tiziana Margaria ; Bernhard Steffen (ed.)
title_fullStr Leveraging applications of formal methods, verification and validation Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings Tiziana Margaria ; Bernhard Steffen (ed.)
title_full_unstemmed Leveraging applications of formal methods, verification and validation Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings Tiziana Margaria ; Bernhard Steffen (ed.)
title_short Leveraging applications of formal methods, verification and validation
title_sort leveraging applications of formal methods verification and validation third international symposium isola 2008 porto sani greece october 13 15 2008 proceedings
title_sub Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008 ; Proceedings
topic Programmverifikation (DE-588)4135576-3 gnd
Programmanalyse (DE-588)4175841-9 gnd
Systemanalyse (DE-588)4116673-5 gnd
Systementwurf (DE-588)4261480-6 gnd
Verifikation (DE-588)4135577-5 gnd
Softwareentwicklung (DE-588)4116522-6 gnd
Formale Methode (DE-588)4333722-3 gnd
topic_facet Programmverifikation
Programmanalyse
Systemanalyse
Systementwurf
Verifikation
Softwareentwicklung
Formale Methode
Konferenzschrift 2008 Sani
url https://doi.org/10.1007/978-3-540-88479-8
volume_link (DE-604)BV041227480
work_keys_str_mv AT margariatiziana leveragingapplicationsofformalmethodsverificationandvalidationthirdinternationalsymposiumisola2008portosanigreeceoctober13152008proceedings
AT steffenbernhard leveragingapplicationsofformalmethodsverificationandvalidationthirdinternationalsymposiumisola2008portosanigreeceoctober13152008proceedings
AT isolasani leveragingapplicationsofformalmethodsverificationandvalidationthirdinternationalsymposiumisola2008portosanigreeceoctober13152008proceedings