skip to main content
Skip header Section
Specifying Systems: The TLA+ Language and Tools for Hardware and Software EngineersAugust 2002
Publisher:
  • Addison-Wesley Longman Publishing Co., Inc.
  • 75 Arlington Street, Suite 300 Boston, MA
  • United States
ISBN:978-0-321-14306-8
Published:01 August 2002
Pages:
364
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Book: This book will teach you how to write specifications of computer systems, using the language TLA+. It's rather long, but most people will read only Part I, which comprises the first 83 pages. That part contains all that most engineers need to know about writing specifications; it assumes only the basic background in computing and knowledge of mathematics expected of an undergraduate studying engineering or computer science. Part II contains more advanced material for more sophisticated readers. The remainder of the book is a reference manualPart III for the TLA+ tools and Part IV for the language itself. The TLA World Wide Web page contains material to accompany the book, including the TLA+ tools, exercises, references to the literature, and a list of corrections. There is a link to the TLA Web page on http://lamport.org. What Is a Specification Writing is nature's way of letting you know how sloppy your thinking is.-Guindon A specification is a written description of what a system is supposed to do. Specifying a system helps us understand it. It's a good idea to understand a system before building it, so it's a good idea to write a specification of a system before implementing it. This book is about specifying the behavioral properties of a systemalso called its functional or logical properties. These are the properties that specify what the system is supposed to do. There are other important kinds of properties that we don't consider, including performance properties. Worst-case performance can often be expressed as a behavioral propertyforexample, Chapter 9 explains how to specify that a system must react within a certain length of time. However, specifying average performance is beyond the scope of the methods described here. Our basic tool for writing specifications is mathematics. Mathematics is nature's way of letting you know how sloppy your writing is. It's hard to be precise in an imprecise language like English or Chinese. In engineering, imprecision can lead to errors. To avoid errors, science and engineering have adopted mathematics as their language. The mathematics we use is more formal than the math you've grown up with. Formal mathematics is nature's way of letting you know how sloppy your mathematics is. The mathematics written by most mathematicians and scientists is not really precise. It's precise in the small, but imprecise in the large. Each equation is a precise assertion, but you have to read the accompanying words to understand how the equations relate to one another and exactly what the theorems mean. Logicians have developed ways of eliminating those words and making the mathematics completely formal, and hence completely precise. Most mathematicians and scientists think that formal mathematics, without words, is long and tiresome. They're wrong. Ordinary mathematics can be expressed compactly in a precise, completely formal language. It takes only about two dozen lines to define the solution to an arbitrary differential equation in the Differential Equations module of Chapter 11. But few specifications need such sophisticated mathematics. Most require only simple application of a few standard mathematical concepts. Why TLA+ We specify a system by describing its allowed behaviorswhat it may do in the course of an execution. In 1977, Amir Pnueli introduced the use of temporal logic for describing system behaviors. In principle, a system could be described by a single temporal logic formula. In practice, it couldn't. Pnueli's temporal logic was ideal for describing some properties of systems, but awkward for others. So, it was usually combined with a more traditional way of describing systems. In the late 1980s, I invented TLA, the Temporal Logic of Actionsa simple variant of Pnueli's original logic. TLA makes it practical to describe a system by a single formula. Most of a TLA specification consists of ordinary, nontemporal mathematics. Temporal logic plays a significant role only in describing those properties that it's good at describing. TLA also provides a nice way to formalize the style of reasoning about systems that has proved to be most effective in practicea style known as assertional reasoning. However, this book is about specification; it says almost nothing about proofs. Temporal logic assumes an underlying logic for expressing ordinary mathematics. There are many ways to formalize ordinary math. Most computer scientists prefer one that resembles their favorite programming language. I chose instead the one that most mathematicians preferthe one logicians call first-order logic and set theory. TLA provides a mathematical foundation for describing systems. To write specifications, we need a complete language built atop that foundation. I initially thought that this language should be some sort of abstract programming language whose semantics would be based on TLA. I didn't know what kind of programming language constructs would be best, so I decided to start writing specifications directly in TLA. I intended to introduce programming constructs as I needed them. To my surprise, I discovered that I didn't need them. What I needed was a robust language for writing mathematics. Although mathematicians have developed the science of writing formulas, they haven't turned that science into an engineering discipline. They have developed notations for mathematics in the small, but not for mathematics in the large. The specification of a real system can be dozens or even hundreds of pages long. Mathematicians know how to write 20-line formulas, not 20-page formulas. So, I had to introduce notations for writing long formulas. What I took from programming languages were ideas for modularizing large specifications. The language I came up with is called TLA+. I refined TLA+ in the course of writing specifications of disparate systems. But it has changed little in the last few years. I have found TLA+ to be quite good for specifying a wide class of systemsfrom program interfaces (APIs) to distributed systems. It can be used to write a precise, formal description of almost any sort of discrete system. It's especially well suited to describing asynchronous systemsthat is, systems with components that do not operate in strict lock-step. About This Book Part I, consisting of Chapters 1 through 7, is the core of the book and is meant to be read from beginning to end. It explains how to specify the class of properties known as safety properties. These properties, which can be specified with almost no temporal logic, are all that most engineers need to know about. After reading Part I, you can read as much of Part II as you like. Each of its chapters is independent of the others. Temporal logic comes to the fore in Chapter 8, where it is used to specify the additional class of properties known as liveness properties. Chapter 9 describes how to specify real-time properties, and Chapter 10 describes how to write specifications as compositions. Chapter 11 contains more advanced examples. The three chapters in Part III serve as the reference manual for three TLA+ tools: the Syntactic Analyzer, the TLATEX typesetting program, and the TLC model checker. If you want to use TLA+, then you probably want to use these tools. They are available from the TLA Web page. TLC is the most sophisticated of them. The examples on the Web can get you started using it, but you'll have to read Chapter 14 to learn to use TLC effectively. Part IV is a reference manual for the TLA+ language. Part I provides a good enough working knowledge of the language for most purposes. You need look at Part IV only if you have questions about the fine points of the syntax and semantics. Chapter 15 gives the syntax of TLA+. Chapter 16 describes the precise meanings and the general forms of all the built-in operators of TLA+; Chapter 17 describes the precise meaning of all the higher-level TLA+ constructs such as definitions. Together, these two chapters specify the semantics of the language. Chapter 18 describes the standard modulesexcept for module RealTime, described in Chapter 9, and module TLC, described in Chapter 14. You might want to look at this chapter if you're curious about how standard elementary mathematics can be formalized in TLA+. Part IV does have something you may want to refer to often: a mini-manual that compactly presents lots of useful information. Pages 268-273 list all TLA+ operators, all user-definable symbols, the precedence of all operators, all operators defined in the standard modules, and the ASCII representation of symbols.

Cited By

  1. ACM
    Carvalho L, Degiovanni R, Cordy M, Aguirre N, Le Traon Y and Papadakis M SpecBCFuzz: Fuzzing LTL Solvers with Boundary Conditions Proceedings of the IEEE/ACM 46th International Conference on Software Engineering, (1-13)
  2. Karsten N and Nestmann U Store Locally, Prove Globally Theoretical Aspects of Computing – ICTAC 2023, (351-369)
  3. Li Z, Yu Z, Zhai L, Peng X and Xu Z ICBench: Benchmarking Knowledge Mastery in Introductory Computer Science Education Benchmarking, Measuring, and Optimizing, (1-17)
  4. Paul S, Agha G, Patterson S and Varela C (2023). Eventual consensus in Synod: verification using a failure-aware actor model, Innovations in Systems and Software Engineering, 19:4, (395-410), Online publication date: 1-Dec-2023.
  5. Goel A and Sakallah K (2023). Regularity and quantification: a new approach to verify distributed protocols, Innovations in Systems and Software Engineering, 19:4, (359-377), Online publication date: 1-Dec-2023.
  6. Liu Z, Teng J and Liu B Multi-dimensional Abstraction and Decomposition for Separation of Concerns Dependable Software Engineering. Theories, Tools, and Applications, (152-170)
  7. Cirstea H and Merz S Extending PlusCal for Modeling Distributed Algorithms iFM 2023, (321-340)
  8. Cornejo C, Regis G, Aguirre N and Frias M (2023). A Study of the Electrum and DynAlloy Dynamic Behavior Notations, IEEE Transactions on Software Engineering, 49:11, (4946-4963), Online publication date: 1-Nov-2023.
  9. Kuze N, Seno K and Ushio T (2023). Learning-based black box checking for k-safety hyperproperties, Engineering Applications of Artificial Intelligence, 126:PC, Online publication date: 1-Nov-2023.
  10. ACM
    Sharma U, Jung R, Tassarotti J, Kaashoek F and Zeldovich N Grove: a Separation-Logic Library for Verifying Distributed Systems Proceedings of the 29th Symposium on Operating Systems Principles, (113-129)
  11. ACM
    Mora F, Desai A, Polgreen E and Seshia S (2023). Message Chains for Distributed System Verification, Proceedings of the ACM on Programming Languages, 7:OOPSLA2, (2224-2250), Online publication date: 16-Oct-2023.
  12. ACM
    Tamir O, Taube M, McMillan K, Shoham S, Howell J, Gueta G and Sagiv M (2023). Counterexample Driven Quantifier Instantiations with Applications to Distributed Protocols, Proceedings of the ACM on Programming Languages, 7:OOPSLA2, (1878-1904), Online publication date: 16-Oct-2023.
  13. Leuschel M and Nayeri N Modelling, Visualisation and Proof of an ETCS Level 3 Moving Block System Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, (193-210)
  14. Howard H, Alder F, Ashton E, Chamayou A, Clebsch S, Costa M, Delignat-Lavaud A, Fournet C, Jeffery A, Kerner M, Kounelis F, Kuppe M, Maffre J, Russinovich M and Wintersteiger C (2023). Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability, Proceedings of the VLDB Endowment, 17:2, (225-240), Online publication date: 1-Oct-2023.
  15. Siefke L, Sommer V, Baylan M and Grunske L Probabilistic Spatial Relations for Monitoring Behavior of Road Users Computer Safety, Reliability, and Security, (151-164)
  16. ACM
    Bakirtzis G, Carr S, Danks D and Topcu U (2023). Dynamic Certification for Autonomous Systems, Communications of the ACM, 66:9, (64-72), Online publication date: 1-Sep-2023.
  17. Klischies D, Schloegel M, Scharnowski T, Bogodukhov M, Rupprecht D and Moonsamy V Instructions unclear Proceedings of the 32nd USENIX Conference on Security Symposium, (3475-3492)
  18. Spring J (2023). An analysis of how many undiscovered vulnerabilities remain in information systems, Computers and Security, 131:C, Online publication date: 1-Aug-2023.
  19. Singh N, Aït‐Ameur Y, Mendil I, Méry D, Navarre D, Palanque P and Pantel M (2023). F3FLUID, Journal of Software: Evolution and Process, 35:7, Online publication date: 2-Jul-2023.
  20. ACM
    Shivam K, Paladugu V and Liu Y Specification and Runtime Checking of Derecho, A Protocol for Fast Replication for Cloud Services Proceedings of the 5th workshop on Advanced tools, programming languages, and PLatforms for Implementing and Evaluating algorithms for Distributed systems, (1-10)
  21. Goel A, Merz S and Sakallah K Towards an Automatic Proof of the Bakery Algorithm Formal Techniques for Distributed Objects, Components, and Systems, (21-28)
  22. ACM
    Yang Y, Bourgeat T, Lau S and Yan M Pensieve: Microarchitectural Modeling for Security Evaluation Proceedings of the 50th Annual International Symposium on Computer Architecture, (1-15)
  23. ACM
    Pick L, Desai A and Gupta A (2023). Psym: Efficient Symbolic Exploration of Distributed Systems, Proceedings of the ACM on Programming Languages, 7:PLDI, (660-685), Online publication date: 6-Jun-2023.
  24. Stock S, Vu F, Geleßus D, Leuschel M, Mashkoor A and Egyed A Validation by Abstraction and Refinement Rigorous State-Based Methods, (160-178)
  25. Hackett F, Rowe J and Kuppe M Understanding Inconsistency in Azure Cosmos DB with TLA+ Proceedings of the 45th International Conference on Software Engineering: Software Engineering in Practice, (1-12)
  26. ACM
    Wang D, Dou W, Gao Y, Wu C, Wei J and Huang T Model Checking Guided Testing for Distributed Systems Proceedings of the Eighteenth European Conference on Computer Systems, (127-143)
  27. ACM
    Hackett F, Hosseini S, Costa R, Do M and Beschastnikh I Compiling Distributed System Models with PGo Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, (159-175)
  28. Altisen K, Corbineau P and Devismes S (2023). Certification of an exact worst-case self-stabilization time, Theoretical Computer Science, 941:C, (262-277), Online publication date: 4-Jan-2023.
  29. ACM
    Pollard S, Armstrong R, Bender J, Hulette G, Mahmood R, Morris K, Rawlings B and Aytac J Q: A Sound Verification Framework for Statecharts and Their Implementations Proceedings of the 8th ACM SIGPLAN International Workshop on Formal Techniques for Safety-Critical Systems, (16-26)
  30. Macedo N, Brunel J, Chemouil D and Cunha A (2022). Pardinus: A Temporal Relational Model Finder, Journal of Automated Reasoning, 66:4, (861-904), Online publication date: 1-Nov-2022.
  31. ACM
    Körner P and Mager F An embedding of B in Clojure Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, (598-606)
  32. Konnov I, Kuppe M and Merz S Specification and Verification with the TLA+ Trifecta: TLC, Apalache, and TLAPS Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles, (88-105)
  33. Bogomolov S, Fitzgerald J, Soudjani S and Stankaitis P Data-Driven Reachability Analysis of Digital Twin FMI Models Leveraging Applications of Formal Methods, Verification and Validation. Practice, (139-158)
  34. Nikitchenko M (2022). Composition-Nominative Methods and Models in Program Development, SN Computer Science, 3:6, Online publication date: 6-Oct-2022.
  35. ACM
    Moreira G, Vasconcellos C and Kniess J Fully-Tested code generation from TLA+ specifications Proceedings of the 7th Brazilian Symposium on Systematic and Automated Software Testing, (19-28)
  36. Kuppe M The TLA Debugger Software Engineering and Formal Methods. SEFM 2022 Collocated Workshops, (174-180)
  37. ACM
    Dong L, Niu Z, Zhu Y and Zhang W Specifying and Verifying SDP Protocol Based Zero Trust Architecture Using TLA+ Proceedings of the 7th International Conference on Cyber Security and Information Engineering, (35-43)
  38. ACM
    Redmond P, Shen G, Vazou N and Kuper L Verified Causal Broadcast with Liquid Haskell Proceedings of the 34th Symposium on Implementation and Application of Functional Languages, (1-13)
  39. Timakov A (2022). Information Flow Control in Software DB Units Based on Formal Verification, Programming and Computing Software, 48:4, (265-285), Online publication date: 1-Aug-2022.
  40. ACM
    Bruel J, Ebersold S, Galinier F, Mazzara M, Naumchev A and Meyer B (2021). The Role of Formalism in System Requirements, ACM Computing Surveys, 54:5, (1-36), Online publication date: 30-Jun-2022.
  41. ACM
    Honoré W, Shin J, Kim J and Shao Z Adore: atomic distributed objects with certified reconfiguration Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (379-394)
  42. Noble J, Streader D, Gariano I and Samarakoon M More Programming Than Programming: Teaching Formal Methods in a Software Engineering Programme NASA Formal Methods, (431-450)
  43. ACM
    Li J, Lattuada A, Zhou Y, Cameron J, Howell J, Parno B and Hawblitzel C (2022). Linear types for large-scale systems verification, Proceedings of the ACM on Programming Languages, 6:OOPSLA1, (1-28), Online publication date: 29-Apr-2022.
  44. ACM
    Kulik T, Dongol B, Larsen P, Macedo H, Schneider S, Tran-Jørgensen P and Woodcock J (2022). A Survey of Practical Formal Methods for Security, Formal Aspects of Computing, 34:1, (1-39), Online publication date: 31-Mar-2022.
  45. Kordon F, Leuschel M, van de Pol J and Thierry-Mieg Y Software Architecture of Modern Model Checkers Computing and Software Science, (393-419)
  46. Houhou S, Baarir S, Poizat P, Quéinnec P and Kahloul L (2022). A First-Order Logic verification framework for communication-parametric and time-aware BPMN collaborations, Information Systems, 104:C, Online publication date: 1-Feb-2022.
  47. ACM
    Schultz W, Dardik I and Tripakis S Formal verification of a distributed dynamic reconfiguration protocol Proceedings of the 11th ACM SIGPLAN International Conference on Certified Programs and Proofs, (143-152)
  48. ACM
    Nehaï Z, Bobot F, Tucci-Piergiovanni S, Delporte-Gallet C and Fauconnier H A TLA+ Formal Proof of a Cross-Chain Swap Proceedings of the 23rd International Conference on Distributed Computing and Networking, (148-159)
  49. Li J, Hu K, Zhu J, Bodeveix J, Ye Y and Han J (2022). Formal Modelling of PBFT Consensus Algorithm in Event-B, Wireless Communications & Mobile Computing, 2022, Online publication date: 1-Jan-2022.
  50. Kadri S, Aouag S and Hedjazi D (2021). MS-QuAAF, Information and Software Technology, 140:C, Online publication date: 1-Dec-2021.
  51. ACM
    Jakobs C, Werner M, Schmidt K and Hansch G Following the White Rabbit: Integrity Verification Based on Risk Analysis Results Proceedings of the 5th ACM Computer Science in Cars Symposium, (1-9)
  52. Saddem-Yagoubi R, Poizat P and Houhou S Business Processes Meet Spatial Concerns: The sBPMN Verification Framework Formal Methods, (218-234)
  53. Arun B, Peluso S, Palmieri R, Losa G and Ravindran B (2021). Taming the Contention in Consensus-Based Distributed Systems, IEEE Transactions on Dependable and Secure Computing, 18:6, (2907-2925), Online publication date: 1-Nov-2021.
  54. ACM
    de Lima Chehab R, Paolillo A, Behrens D, Fu M, Härtig H and Chen H CLoF Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles, (851-865)
  55. ACM
    Jaber N, Wagner C, Jacobs S, Kulkarni M and Samanta R (2021). QuickSilver: modeling and parameterized verification for distributed agreement-based systems, Proceedings of the ACM on Programming Languages, 5:OOPSLA, (1-31), Online publication date: 20-Oct-2021.
  56. ACM
    Soethout T, van der Storm T and Vinju J Contract-based return-value commutativity: safely exploiting contract-based commutativity for faster serializable transactions Proceedings of the 11th ACM SIGPLAN International Workshop on Programming Based on Actors, Agents, and Decentralized Control, (1-11)
  57. Peyras Q, Brunel J and Chemouil D (2021). A decidable and expressive fragment of Many-Sorted First-Order Linear Temporal Logic, Information and Computation, 280:C, Online publication date: 1-Oct-2021.
  58. Körner P, Bendisposto J, Dunkelau J, Krings S and Leuschel M (2020). Integrating formal specifications into applications: the ProB Java API, Formal Methods in System Design, 58:1-2, (160-187), Online publication date: 1-Oct-2021.
  59. Bertrand N, Konnov I, Lazić M and Widder J (2021). Verification of randomized consensus algorithms under round-rigid adversaries, International Journal on Software Tools for Technology Transfer (STTT), 23:5, (797-821), Online publication date: 1-Oct-2021.
  60. Defourné A Improving Automation for Higher-Order Proof Steps Frontiers of Combining Systems, (139-153)
  61. Padhy S and Stubbs J Designing and Proving Properties of the Abaco Autoscaler Using TLA+ Software Verification, (86-103)
  62. ACM
    Hou K, Li Y, Yu Y, Chen Y and Zhou H Discovering emergency call pitfalls for cellular networks with formal methods Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, (296-309)
  63. Bodeveix J and Filali M Event-B Formalization of Event-B Contexts Rigorous State-Based Methods, (66-80)
  64. ACM
    Badash L, Tapas N, Nadler A, Longo F and Shabtai A Blockchain-based bug bounty framework Proceedings of the 36th Annual ACM Symposium on Applied Computing, (239-248)
  65. ACM
    Altisen K, Corbineau P and Devismes S Certification of an Exact Worst-Case Self-Stabilization Time Proceedings of the 22nd International Conference on Distributed Computing and Networking, (46-55)
  66. ACM
    Howard H, Charapko A and Mortier R Fast Flexible Paxos: Relaxing Quorum Intersection for Fast Paxos Proceedings of the 22nd International Conference on Distributed Computing and Networking, (186-190)
  67. ACM
    Lee G SASIL: a domain-specific language for simulating declarative specifications of scheduling systems Companion Proceedings of the 2020 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity, (13-15)
  68. Hance T, Lattuada A, Hawblitzel C, Howell J, Johnson R and Parno B Storage systems are distributed systems (so verify them that way!) Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, (99-115)
  69. ACM
    Ouyang H, Wei H and Huang Y Checking Causal Consistency of MongoDB Proceedings of the 12th Asia-Pacific Symposium on Internetware, (209-216)
  70. ACM
    Kulik T, Boudjadar J and Tran-Jørgensen P Security Verification of Industrial Control Systems using Partial Model Checking Proceedings of the 8th International Conference on Formal Methods in Software Engineering, (98-108)
  71. Liu Y and Stoller S Assurance of Distributed Algorithms and Systems: Runtime Checking of Safety and Liveness Runtime Verification, (47-66)
  72. ACM
    Griffin J, Lesani M, Shadab N and Yin X (2020). TLC: temporal logic of distributed components, Proceedings of the ACM on Programming Languages, 4:ICFP, (1-30), Online publication date: 2-Aug-2020.
  73. ACM
    Glabbeek R and Höfner P (2019). Progress, Justness, and Fairness, ACM Computing Surveys, 52:4, (1-38), Online publication date: 31-Jul-2020.
  74. Thule C, Gomes C and Lausdahl K Formally verified FMI enabled external data broker Proceedings of the 2020 Summer Simulation Conference, (1-12)
  75. Konnov I, Lazić M, Stoilkovska I and Widder J Tutorial: Parameterized Verification with Byzantine Model Checker Formal Techniques for Distributed Objects, Components, and Systems, (189-207)
  76. Alquraan A, Kogan A, Marathe V and Al-Kiswany S (2020). Scalable, near-zero loss disaster recovery for distributed data stores, Proceedings of the VLDB Endowment, 13:9, (1429-1442), Online publication date: 1-May-2020.
  77. Zhu C, Butler M and Cirstea C (2020). Formalizing hierarchical scheduling for refinement of real-time systems, Science of Computer Programming, 189:C, Online publication date: 1-Apr-2020.
  78. ACM
    Garg M, Peluso S, Arun B and Ravindran B Generalized Consensus for Practical Fault Tolerance Proceedings of the 20th International Middleware Conference, (55-67)
  79. Conchon S and Roux M Reasoning About Universal Cubes in MCMT Formal Methods and Software Engineering, (270-285)
  80. Charapko A, Ailijiang A, Demirbas M and Kulkarni S (2019). Retroscope: Retrospective Monitoring of Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, 30:11, (2582-2594), Online publication date: 1-Nov-2019.
  81. ACM
    Ma H, Goel A, Jeannin J, Kapritsos M, Kasikci B and Sakallah K I4 Proceedings of the 27th ACM Symposium on Operating Systems Principles, (370-384)
  82. Asavoae M, Haur I, Jan M, Ben Hedia B and Schoeberl M Towards Formal Co-validation of Hardware and Software Timing Models of CPSs Cyber Physical Systems. Model-Based Design, (203-227)
  83. ACM
    Konnov I, Kukovec J and Tran T (2019). TLA+ model checking made symbolic, Proceedings of the ACM on Programming Languages, 3:OOPSLA, (1-30), Online publication date: 10-Oct-2019.
  84. ACM
    Tran-Jørgensen P, Kulik T, Boudjadar J and Larsen P Security analysis of cloud-connected industrial control systems using combinatorial testing Proceedings of the 17th ACM-IEEE International Conference on Formal Methods and Models for System Design, (1-11)
  85. Hurault A and Quéinnec P Proving a Non-blocking Algorithm for Process Renaming with TLA Tests and Proofs, (147-166)
  86. ACM
    Liu Y, Chand S and Stoller S Moderately Complex Paxos Made Simple Proceedings of the 21st International Symposium on Principles and Practice of Declarative Programming, (1-15)
  87. Jones C Reasoning About Shared-Variable Concurrency: Interactions Between Research Threads Formal Methods. FM 2019 International Workshops, (54-72)
  88. Chevrou F, Hurault A, Nakajima S and Quéinnec P A Map of Asynchronous Communication Models Formal Methods. FM 2019 International Workshops, (307-322)
  89. Körner P, Bendisposto J, Dunkelau J, Krings S and Leuschel M Embedding High-Level Formal Specifications into Applications Formal Methods – The Next 30 Years, (519-535)
  90. Houhou S, Baarir S, Poizat P and Quéinnec P A First-Order Logic Semantics for Communication-Parametric BPMN Collaborations Business Process Management, (52-68)
  91. ACM
    Lång J and Prasetya I Model checking a C++ software framework: a case study Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1026-1036)
  92. ACM
    Wang Z, Zhao C, Mu S, Chen H and Li J On the Parallels between Paxos and Raft, and how to Port Optimizations Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, (445-454)
  93. Hallen M, Paramonov S, Janssens G and Denecker M (2019). Knowledge representation analysis of graph mining, Annals of Mathematics and Artificial Intelligence, 86:1-3, (21-60), Online publication date: 1-Jul-2019.
  94. ACM
    Chajed T, Tassarotti J, Kaashoek M and Zeldovich N Argosy: verifying layered storage systems with recovery refinement Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, (1054-1068)
  95. Westman J and Nyberg M (2019). Providing tool support for specifying safety-critical systems by enforcing syntactic contract conditions, Requirements Engineering, 24:2, (231-256), Online publication date: 1-Jun-2019.
  96. ACM
    Ma H, Goel A, Jeannin J, Kapritsos M, Kasikci B and Sakallah K Towards Automatic Inference of Inductive Invariants Proceedings of the Workshop on Hot Topics in Operating Systems, (30-36)
  97. ACM
    Xiao J, Andelfinger P, Eckhoff D, Cai W and Knoll A (2019). A Survey on Agent-based Simulation Using Hardware Accelerators, ACM Computing Surveys, 51:6, (1-35), Online publication date: 27-Feb-2019.
  98. Lin Y, Bundy A, Grov G and Maclean E (2019). Automating Event-B invariant proofs by rippling and proof patching, Formal Aspects of Computing, 31:1, (95-129), Online publication date: 12-Feb-2019.
  99. Ogata K (2019). A divide & conquer approach to liveness model checking under fairness & anti-fairness assumptions, Frontiers of Computer Science: Selected Publications from Chinese Universities, 13:1, (51-72), Online publication date: 1-Feb-2019.
  100. ACM
    Koh N, Li Y, Li Y, Xia L, Beringer L, Honoré W, Mansky W, Pierce B and Zdancewic S From C to interaction trees: specifying, verifying, and testing a networked server Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, (234-248)
  101. Cristiá M, Hollmann D and Frydman C (2019). A multi-target compiler for CML-DEVS, Simulation, 95:1, (11-29), Online publication date: 1-Jan-2019.
  102. ACM
    Taube M, Losa G, McMillan K, Padon O, Sagiv M, Shoham S, Wilcox J and Woos D (2018). Modularity for decidability of deductive verification with applications to distributed systems, ACM SIGPLAN Notices, 53:4, (662-677), Online publication date: 2-Dec-2018.
  103. ACM
    Liu H, Wang X, Li G, Lu S, Ye F and Tian C (2018). FCatch, ACM SIGPLAN Notices, 53:2, (419-431), Online publication date: 30-Nov-2018.
  104. Desai A, Qadeer S and Seshia S Programming Safe Robotics Systems: Challenges and Advances Leveraging Applications of Formal Methods, Verification and Validation. Verification, (103-119)
  105. Broy M, Havelund K, Kumar R and Steffen B Towards a Unified View of Modeling and Programming (ISoLA 2018 Track Introduction) Leveraging Applications of Formal Methods, Verification and Validation. Modeling, (3-21)
  106. Spring J and Pym D Towards Scientific Incident Response Decision and Game Theory for Security, (398-417)
  107. ACM
    Brunel J, Chemouil D, Cunha A and Macedo N The electrum analyzer: model checking relational first-order temporal specifications Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (884-887)
  108. ACM
    Liu Y Logical Clocks Are Not Fair Proceedings of the 2018 Workshop on Advanced Tools, Programming Languages, and PLatforms for Implementing and Evaluating Algorithms for Distributed systems, (21-27)
  109. ACM
    Taube M, Losa G, McMillan K, Padon O, Sagiv M, Shoham S, Wilcox J and Woos D Modularity for decidability of deductive verification with applications to distributed systems Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, (662-677)
  110. ACM
    Yu H RDSQ Proceedings of the 2018 International Conference on Management of Data, (1821-1823)
  111. ACM
    Sadeghi A, Jabbarvand R, Ghorbani N, Bagheri H and Malek S A temporal permission analysis and enforcement framework for Android Proceedings of the 40th International Conference on Software Engineering, (846-857)
  112. ACM
    Liu H, Wang X, Li G, Lu S, Ye F and Tian C FCatch Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, (419-431)
  113. Prasetya I (2018). Temporal algebraic query of test sequences, Journal of Systems and Software, 136:C, (223-236), Online publication date: 1-Feb-2018.
  114. Cao J, Li H, Ma M, Li F and Chen T (2018). UPPGHA, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  115. Konnov I, Lazić M, Veith H and Widder J (2017). Para$$^2$$2, Formal Methods in System Design, 51:2, (270-307), Online publication date: 1-Nov-2017.
  116. ACM
    Padon O, Losa G, Sagiv M and Shoham S (2017). Paxos made EPR: decidable reasoning about distributed protocols, Proceedings of the ACM on Programming Languages, 1:OOPSLA, (1-31), Online publication date: 12-Oct-2017.
  117. ACM
    Papadakis M, Bernstein G, Sharma R, Aiken A and Hanrahan P (2017). Seam: provably safe local edits on graphs, Proceedings of the ACM on Programming Languages, 1:OOPSLA, (1-29), Online publication date: 12-Oct-2017.
  118. ACM
    Liu Y, Stoller S and Lin B (2017). From Clarity to Efficiency for Distributed Algorithms, ACM Transactions on Programming Languages and Systems, 39:3, (1-41), Online publication date: 30-Sep-2017.
  119. ACM
    Choi J, Vijayaraghavan M, Sherman B, Chlipala A and Arvind (2017). Kami: a platform for high-level parametric hardware specification and its modular verification, Proceedings of the ACM on Programming Languages, 1:ICFP, (1-30), Online publication date: 29-Aug-2017.
  120. ACM
    Regis G, Cornejo C, Gutiérrez Brida S, Politano M, Raverta F, Ponzio P, Aguirre N, Galeotti J and Frias M DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (969-973)
  121. ACM
    Hawblitzel C, Howell J, Kapritsos M, Lorch J, Parno B, Roberts M, Setty S and Zill B (2017). IronFleet, Communications of the ACM, 60:7, (83-92), Online publication date: 26-Jun-2017.
  122. ACM
    Abadi M, Isard M and Murray D A computational model for TensorFlow: an introduction Proceedings of the 1st ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, (1-7)
  123. Hillah L, Maesano A, Rosa F, Kordon F, Wuillemin P, Fontanelli R, Bona S, Guerri D and Maesano L (2017). Automation and intelligent scheduling of distributed system functional testing, International Journal on Software Tools for Technology Transfer (STTT), 19:3, (281-308), Online publication date: 1-Jun-2017.
  124. ACM
    Alur R and Tripakis S (2017). Automatic Synthesis of Distributed Protocols, ACM SIGACT News, 48:1, (55-90), Online publication date: 10-Mar-2017.
  125. Bjørner D (2017). Manifest domains: analysis and description, Formal Aspects of Computing, 29:2, (175-225), Online publication date: 1-Mar-2017.
  126. Krings S and Leuschel M (2017). Inferring physical units in formal models, Software and Systems Modeling (SoSyM), 16:1, (25-47), Online publication date: 1-Feb-2017.
  127. Ye K and Woodcock J (2017). Model checking of state-rich formalism [InlineEquation not available, International Journal on Software Tools for Technology Transfer (STTT), 19:1, (73-96), Online publication date: 1-Feb-2017.
  128. ACM
    Schewe K, Ferrarotti F, Tec L, Wang Q and An W Evolving concurrent systems Proceedings of the Australasian Computer Science Week Multiconference, (1-10)
  129. Grzanek K (2016). Low-Cost Dynamic Constraint Checking for the JVM, Journal of Applied Computer Science Methods, 8:2, (115-136), Online publication date: 1-Dec-2016.
  130. ACM
    Macedo N, Brunel J, Chemouil D, Cunha A and Kuperberg D Lightweight specification and analysis of dynamic systems with rich configurations Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, (373-383)
  131. Hudon S, Hoang T and Ostroff J (2016). The Unit-B method, Software and Systems Modeling (SoSyM), 15:4, (1091-1116), Online publication date: 1-Oct-2016.
  132. Dobrikov I and Leuschel M Enabling Analysis for Event-B Proceedings of the 5th International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z - Volume 9675, (102-118)
  133. Azmy N, Merz S and Weidenbach C A Rigorous Correctness Proof for Pastry Proceedings of the 5th International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z - Volume 9675, (86-101)
  134. Merz S and Vanzetto H Encoding TLA$$^{+}$$+ into Many-Sorted First-Order Logic Proceedings of the 5th International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z - Volume 9675, (54-69)
  135. Kossak F and Mashkoor A How to Select the Suitable Formal Method forźan Industrial Application Proceedings of the 5th International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z - Volume 9675, (213-228)
  136. Clark J, Bendisposto J, Hallerstede S, Hansen D and Leuschel M Generating Event-B Specifications from Algorithm Descriptions Proceedings of the 5th International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z - Volume 9675, (183-197)
  137. Hansen D, Schneider D and Leuschel M Using B and ProB for Data Validation Projects Proceedings of the 5th International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z - Volume 9675, (167-182)
  138. ACM
    Hillah L, Maesano A, Maesano L, De Rosa F, Kordon F and Wuillemin P Service functional testing automation with intelligent scheduling and planning Proceedings of the 31st Annual ACM Symposium on Applied Computing, (1605-1610)
  139. Bourke T, Glabbeek R and Höfner P (2016). Mechanizing a Process Algebra for Network Protocols, Journal of Automated Reasoning, 56:3, (309-341), Online publication date: 1-Mar-2016.
  140. Singh R and Gonsalves T (2015). A pragmatic approach towards secure sharing of digital objects, Security and Communication Networks, 8:18, (3914-3926), Online publication date: 1-Dec-2015.
  141. Cao J, Ma M and Li H (2015). GBAAM, Security and Communication Networks, 8:17, (3282-3299), Online publication date: 25-Nov-2015.
  142. Lu T Formal Verification of the Pastry Protocol Using $$\mathrm{{TLA}}^{+}$$ Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - Volume 9409, (284-299)
  143. Moszkowski B and Guelev D An Application of Temporal Projection toźInterleaving Concurrency Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - Volume 9409, (153-167)
  144. ACM
    Pearce D Some usability hypotheses for verification Proceedings of the 6th Workshop on Evaluation and Usability of Programming Languages and Tools, (57-60)
  145. ACM
    Hawblitzel C, Howell J, Kapritsos M, Lorch J, Parno B, Roberts M, Setty S and Zill B IronFleet Proceedings of the 25th Symposium on Operating Systems Principles, (1-17)
  146. Towards verification of hybrid systems in a foundational proof assistant Proceedings of the 2015 ACM/IEEE International Conference on Formal Methods and Models for Codesign, (248-257)
  147. ACM
    Gammie P, Hosking A and Engelhardt K (2015). Relaxing safely: verified on-the-fly garbage collection for x86-TSO, ACM SIGPLAN Notices, 50:6, (99-109), Online publication date: 7-Aug-2015.
  148. ACM
    Wilcox J, Woos D, Panchekha P, Tatlock Z, Wang X, Ernst M and Anderson T (2015). Verdi: a framework for implementing and formally verifying distributed systems, ACM SIGPLAN Notices, 50:6, (357-368), Online publication date: 7-Aug-2015.
  149. ACM
    Gammie P, Hosking A and Engelhardt K Relaxing safely: verified on-the-fly garbage collection for x86-TSO Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, (99-109)
  150. ACM
    Wilcox J, Woos D, Panchekha P, Tatlock Z, Wang X, Ernst M and Anderson T Verdi: a framework for implementing and formally verifying distributed systems Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, (357-368)
  151. ACM
    Lee H, Seibert J, Fistrovic D, Killian C and Nita-Rotaru C (2015). Gatling, ACM Transactions on Information and System Security, 17:4, (1-34), Online publication date: 24-Apr-2015.
  152. ACM
    Börger E and Zenzaro S Modeling for change via component-based decomposition and ASM refinement Proceedings of the 7th International Conference on Subject-Oriented Business Process Management, (1-13)
  153. Abadi M and Isard M On the Flow of Data, Information, and Time Proceedings of the 4th International Conference on Principles of Security and Trust - Volume 9036, (73-92)
  154. Khamespanah E, Sirjani M, Sabahi Kaviani Z, Khosravi R and Izadi M (2015). Timed Rebeca schedulability and deadlock freedom analysis using bounded floating time transition system, Science of Computer Programming, 98:P2, (184-204), Online publication date: 1-Feb-2015.
  155. Hawblitzel C, Howell J, Lorch J, Narayan A, Parno B, Zhang D and Zill B Ironclad apps Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation, (165-181)
  156. From visual to logical formalisms for SoC validation Proceedings of the Twelfth ACM/IEEE Conference on Formal Methods and Models for Codesign, (165-174)
  157. Gmeiner A, Konnov I, Schmid U, Veith H and Widder J Tutorial on Parameterized Model Checking of Fault-Tolerant Distributed Algorithms Advanced Lectures of the 14th International School on Formal Methods for Executable Software Models - Volume 8483, (122-171)
  158. Hansen D and Leuschel M Translating B to TLA+ for Validation with TLC Proceedings of the 4th International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z - Volume 8477, (40-55)
  159. Merz S and Vanzetto H Refinement Types for tla + Proceedings of the 6th International Symposium on NASA Formal Methods - Volume 8430, (143-157)
  160. Delporte-Gallet C, Fauconnier H, Gafni E and Lamport L Adaptive Register Allocation with a Linear Number of Registers Proceedings of the 27th International Symposium on Distributed Computing - Volume 8205, (269-283)
  161. Dong R, Faber J, Ke W and Liu Z rCOS Unifying Theories of Programming and Formal Engineering Methods, (1-66)
  162. ACM
    John A, Konnov I, Schmid U, Veith H and Widder J Brief announcement Proceedings of the 2013 ACM symposium on Principles of distributed computing, (119-121)
  163. Gunawan L and Herrmann P Compositional verification of application-level security properties Proceedings of the 5th international conference on Engineering Secure Software and Systems, (75-90)
  164. ACM
    Carro M, Herranz Á and Mariño J (2013). A model-driven approach to teaching concurrency, ACM Transactions on Computing Education, 13:1, (1-19), Online publication date: 1-Jan-2013.
  165. ACM
    Mosbahi O (2013). Combining Formal Methods for the Development of Reactive Systems, ACM Transactions on Embedded Computing Systems, 12:1, (1-29), Online publication date: 1-Jan-2013.
  166. Kotla R, Rodeheffer T, Roy I, Stuedi P and Wester B Pasture Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation, (321-334)
  167. Liu Y, Stoller S and Lin B High-Level executable specifications of distributed algorithms Proceedings of the 14th international conference on Stabilization, Safety, and Security of Distributed Systems, (95-110)
  168. Küfner P, Nestmann U and Rickmann C Formal verification of distributed algorithms Proceedings of the 7th IFIP TC 1/WG 202 international conference on Theoretical Computer Science, (209-224)
  169. Aarts F, Heidarian F and Vaandrager F A theory of history dependent abstractions for learning interface automata Proceedings of the 23rd international conference on Concurrency Theory, (240-255)
  170. Dongol B and Hayes I Rely/Guarantee reasoning for teleo-reactive programs over multiple time bands Proceedings of the 9th international conference on Integrated Formal Methods, (39-53)
  171. Hansen D and Leuschel M Translating TLA+ to b for validation with ProB Proceedings of the 9th international conference on Integrated Formal Methods, (24-38)
  172. Ježek K, Brada P and Holý L Enhancing OSGi with explicit, vendor independent extra-functional properties Proceedings of the 50th international conference on Objects, Models, Components, Patterns, (108-123)
  173. ACM
    Slåtten V, Kraemer F and Herrmann P (2011). Towards automatic generation of formal specifications to validate and verify reliable distributed systems, ACM SIGPLAN Notices, 47:3, (147-156), Online publication date: 18-Apr-2012.
  174. ACM
    Qian Z, Chen X, Kang N, Chen M, Yu Y, Moscibroda T and Zhang Z MadLINQ Proceedings of the 7th ACM european conference on Computer Systems, (197-210)
  175. Merz S and Vanzetto H Automatic verification of TLA+ proof obligations with SMT solvers Proceedings of the 18th international conference on Logic for Programming, Artificial Intelligence, and Reasoning, (289-303)
  176. Kapus T Specifying system families with TLA+ Proceedings of the 11th WSEAS international conference on Software Engineering, Parallel and Distributed Systems, and proceedings of the 9th WSEAS international conference on Engineering Education, (98-103)
  177. Függer M and Schmid U (2012). Reconciling fault-tolerant distributed computing and systems-on-chip, Distributed Computing, 24:6, (323-355), Online publication date: 1-Jan-2012.
  178. ACM
    Poroor J and Jayaraman B Formal specification and verification of vehicular handoff using π-calculus Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, (165-168)
  179. ACM
    Slåtten V, Kraemer F and Herrmann P Towards automatic generation of formal specifications to validate and verify reliable distributed systems Proceedings of the 10th ACM international conference on Generative programming and component engineering, (147-156)
  180. ACM
    Nikhil R (2011). Abstraction in hardware system design, Communications of the ACM, 54:10, (36-44), Online publication date: 1-Oct-2011.
  181. Méry D and Singh N Medical protocol diagnosis using formal methods Proceedings of the First international conference on Foundations of Health Informatics Engineering and Systems, (1-20)
  182. ACM
    Nikhil R (2011). Abstraction in Hardware System Design, Queue, 9:8, (40-54), Online publication date: 1-Aug-2011.
  183. Lu T, Merz S and Weidenbach C Towards verification of the pastry protocol using TLA+ Proceedings of the joint 13th IFIP WG 6.1 and 30th IFIP WG 6.1 international conference on Formal techniques for distributed systems, (244-258)
  184. ACM
    Perseil I (2011). Towards a specific software development process for high integrity systems, ACM SIGSOFT Software Engineering Notes, 36:1, (1-8), Online publication date: 24-Jan-2011.
  185. Horning J The development and writing of "process structuring" Dependable and Historic Computing, (267-272)
  186. Hölzl M and Wirsing M Towards a system model for ensembles Formal modeling, (241-261)
  187. Kaliappan P, Kö H and Schmerl S Model-driven protocol design based on component oriented modeling Proceedings of the 12th international conference on Formal engineering methods and software engineering, (613-629)
  188. Akhtar S, Merz S and Quinson M A high-level language for modeling algorithms and their properties Proceedings of the 13th Brazilian conference on Formal methods: foundations and applications, (49-63)
  189. Dick R Reliability, thermal, and power modeling and optimization Proceedings of the International Conference on Computer-Aided Design, (181-184)
  190. Clarkson M and Schneider F (2010). Hyperproperties, Journal of Computer Security, 18:6, (1157-1210), Online publication date: 21-Sep-2010.
  191. Hayes I, Dunne S and Meinicke L Unifying theories of programming that distinguish nontermination and abort Proceedings of the 10th international conference on Mathematics of program construction, (178-194)
  192. Dongol B and Hayes I Compositional action system derivation using enforced properties Proceedings of the 10th international conference on Mathematics of program construction, (119-139)
  193. ACM
    Ghanbari S, Soundararajan G and Amza C A query language and runtime tool for evaluating behavior of multi-tier servers Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (131-142)
  194. ACM
    Ghanbari S, Soundararajan G and Amza C (2010). A query language and runtime tool for evaluating behavior of multi-tier servers, ACM SIGMETRICS Performance Evaluation Review, 38:1, (131-142), Online publication date: 12-Jun-2010.
  195. ACM
    Guerraoui R, Knežević N, Quéma V and Vukolić M The next 700 BFT protocols Proceedings of the 5th European conference on Computer systems, (363-376)
  196. Bäumler S, Balser M, Nafz F, Reif W and Schellhorn G (2010). Interactive verification of concurrent systems using symbolic execution, AI Communications, 23:2-3, (285-307), Online publication date: 1-Apr-2010.
  197. ACM
    Krishnan P and Pari-Salas P Data generation in model-based testing Proceedings of the 2010 ACM Symposium on Applied Computing, (2211-2215)
  198. ACM
    Ghanbari S, Soundararajan G and Amza C (2010). SelfTalk for Dena, ACM SIGOPS Operating Systems Review, 44:1, (30-34), Online publication date: 12-Mar-2010.
  199. Chen X, Yang Y, Gopalakrishnan G and Chou C (2010). Efficient methods for formally verifying safety properties of hierarchical cache coherence protocols, Formal Methods in System Design, 36:1, (37-64), Online publication date: 1-Feb-2010.
  200. Tang C DSF Proceedings of the ACM/IFIP/USENIX 10th international conference on Middleware, (414-436)
  201. Tang C DSF Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware, (1-20)
  202. Stappers F, Reniers M and Groote J Suitability of mCRL2 for concurrent-system design Proceedings of the 8th international conference on Formal methods for components and objects, (166-185)
  203. González De Mendívil J, Armendáriz-Iñigo J, Garitagoitia J and Muñoz-Escoí F (2009). A formal analysis of database replication protocols with SI replicas and crash failures, The Journal of Supercomputing, 50:2, (121-161), Online publication date: 1-Nov-2009.
  204. Masalagiu C, Chin W, Andrei Ş and Alaiba V (2009). A rigorous methodology for specification and verification of business processes, Formal Aspects of Computing, 21:5, Online publication date: 1-Oct-2009.
  205. ACM
    Zhou L (2009). Building reliable large-scale distributed systems, ACM SIGACT News, 40:3, (78-85), Online publication date: 25-Sep-2009.
  206. Dixon C, Fisher M and Konev B Taming the complexity of temporal epistemic reasoning Proceedings of the 7th international conference on Frontiers of combining systems, (198-213)
  207. ACM
    Lu Y, Zhou H, Shang L and Zeng X Multicore parallel min-cost flow algorithm for CAD applications Proceedings of the 46th Annual Design Automation Conference, (832-837)
  208. Burns E, Lemons S, Zhou R and Ruml W Best-first heuristic search for multi-core machines Proceedings of the 21st International Joint Conference on Artificial Intelligence, (449-455)
  209. ACM
    Boute R (2009). Teaching and practicing computer science at the university level, ACM SIGCSE Bulletin, 41:2, (24-30), Online publication date: 25-Jun-2009.
  210. Ramasubramanian V, Rodeheffer T, Terry D, Walraed-Sullivan M, Wobber T, Marshall C and Vahdat A Cimbiosys Proceedings of the 6th USENIX symposium on Networked systems design and implementation, (261-276)
  211. Cansell D and Méry D Designing old and new distributed algorithms by replaying an incremental proof-based development Rigorous Methods for Software Construction and Analysis, (17-32)
  212. Wang H, Liu H and Guo X An Efficient Approach to Compose Web Services Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (538-541)
  213. Prabhakaran V, Rodeheffer T and Zhou L Transactional flash Proceedings of the 8th USENIX conference on Operating systems design and implementation, (147-160)
  214. ACM
    Hayes I Towards reasoning about teleo-reactive programs for robust real-time systems Proceedings of the 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems, (87-94)
  215. Taibi T (2008). Formal specification and validation of multi-agent behaviour using TLA+ and TLC model checker, International Journal of Artificial Intelligence and Soft Computing, 1:1, (99-113), Online publication date: 1-Nov-2008.
  216. ACM
    Liveris N, Zhou H, Dick R and Banerjee P State space abstraction for parameterized self-stabilizing embedded systems Proceedings of the 8th ACM international conference on Embedded software, (11-20)
  217. Lamport L (2008). Implementing dataflow with threads, Distributed Computing, 21:3, (163-181), Online publication date: 1-Sep-2008.
  218. Cohen A, Pnueli A and Zuck L Mechanical Verification of Transactional Memories with Non-transactional Memory Accesses Proceedings of the 20th international conference on Computer Aided Verification, (121-134)
  219. ACM
    Benveniste A, Caillaud B, Carloni L, Caspi P and Sangiovanni-Vincentelli A (2008). Composing heterogeneous reactive systems, ACM Transactions on Embedded Computing Systems, 7:4, (1-36), Online publication date: 1-Jul-2008.
  220. Slanina M, Sipma H and Manna Z (2008). Deductive verification of alternating systems, Formal Aspects of Computing, 20:4-5, (507-560), Online publication date: 1-Jul-2008.
  221. ACM
    Beers R Pre-RTL formal verification Proceedings of the 45th annual Design Automation Conference, (806-811)
  222. ACM
    Maccormick J, Thekkath C, Jager M, Roomp K, Zhou L and Peterson R (2008). Niobe, ACM Transactions on Storage, 3:4, (1-43), Online publication date: 1-Feb-2008.
  223. Schmidt R and Pedone F A formal analysis of the deferred update technique Proceedings of the 11th international conference on Principles of distributed systems, (16-30)
  224. Schmidt R and Pedone F A Formal Analysis of the Deferred Update Technique Principles of Distributed Systems, (16-30)
  225. ACM
    Gérard S, Feiler P, Rolland J, Filali M, Reiser M, Delanote D, Berbers Y, Pautet L and Perseil I (2007). UML&AADL '2007 grand challenges, ACM SIGBED Review, 4:4, (1-1), Online publication date: 1-Oct-2007.
  226. ACM
    Jean-Paul B, Raphaël C, David C, Mamoun F and Jean-François R A mapping from AADL to Java-RTSJ Proceedings of the 5th international workshop on Java technologies for real-time and embedded systems, (165-174)
  227. Täubrich J and Von Hanxleden R Formal specification and analysis of AFDX redundancy management algorithms Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (436-450)
  228. Langenstein B, Nonnengart A, Rock G and Stephan W Verification of distributed applications Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (315-328)
  229. Dixon C, Fisher M and Konev B Temporal Logic with Capacity Constraints Proceedings of the 6th international symposium on Frontiers of Combining Systems, (163-177)
  230. ACM
    Latry F, Mercadal J and Consel C Staging telephony service creation Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, (99-110)
  231. ACM
    Killian C, Anderson J, Braud R, Jhala R and Vahdat A Mace Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (179-188)
  232. ACM
    Killian C, Anderson J, Braud R, Jhala R and Vahdat A (2007). Mace, ACM SIGPLAN Notices, 42:6, (179-188), Online publication date: 10-Jun-2007.
  233. ACM
    Vardi M Formal techniques for SystemC verification Proceedings of the 44th annual Design Automation Conference, (188-192)
  234. Awan A, Sameh A, Jagannathan S and Grama A Building Verifiable Sensing Applications Through Temporal Logic Specification Proceedings of the 7th international conference on Computational Science, Part I: ICCS 2007, (1205-1212)
  235. Taibi T and Herranz Á Automatic proof of refinement among design patterns using the TLC model checker Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6, (542-547)
  236. Reisig W, Bretschneider J, Fahland D, Lohmann N, Massuthe P and Stahl C Services as a paradigm of computation Formal methods and hybrid real-time systems, (521-538)
  237. ACM
    Wang B and Pronk C (2006). Design and implementation of a GUI for the TLC model checker, ACM SIGPLAN Notices, 41:12, (38-43), Online publication date: 1-Dec-2006.
  238. Gruhn V and Schäfer C Using mobile architecture modeling and simulation for enterprise applications Proceedings of the 2nd international conference on Trends in enterprise application architecture, (142-157)
  239. Gruhn V and Schäfer C Using Mobile Architecture Modeling and Simulation for Enterprise Applications Trends in Enterprise Application Architecture, (142-157)
  240. Abrial J, Butler M, Hallerstede S and Voisin L An open extensible tool environment for event-b Proceedings of the 8th international conference on Formal Methods and Software Engineering, (588-605)
  241. Garcia M Formalizing the well-formedness rules of EJB3QL in UML + OCL Proceedings of the 2006 international conference on Models in software engineering, (66-75)
  242. ACM
    Lorch J, Adya A, Bolosky W, Chaiken R, Douceur J and Howell J (2006). The SMART way to migrate replicated stateful services, ACM SIGOPS Operating Systems Review, 40:4, (103-115), Online publication date: 1-Oct-2006.
  243. Hammond K, Grov G, Michaelson G and Ireland A Low-level programming in Hume Proceedings of the 18th international conference on Implementation and application of functional languages, (91-107)
  244. Parreira J, Donato D, Michel S and Weikum G Efficient and decentralized PageRank approximation in a peer-to-peer web search network Proceedings of the 32nd international conference on Very large data bases, (415-426)
  245. ACM
    Erlingsson Ú and MacCormick J (2006). Ad hoc extensibility and access control, ACM SIGOPS Operating Systems Review, 40:3, (93-101), Online publication date: 1-Jul-2006.
  246. Gopalakrishnan G and Kirby R Toward reliable and efficient message passing software through formal analysis Proceedings of the 20th international conference on Parallel and distributed processing, (284-284)
  247. ACM
    Elson J and Parker A Tinker Proceedings of the 5th international conference on Information processing in sensor networks, (350-357)
  248. ACM
    Lorch J, Adya A, Bolosky W, Chaiken R, Douceur J and Howell J The SMART way to migrate replicated stateful services Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, (103-115)
  249. ACM
    Dovier A, Formisano A and Omodeo E (2006). Decidability results for sets with atoms, ACM Transactions on Computational Logic, 7:2, (269-301), Online publication date: 1-Apr-2006.
  250. Bodeveix J, Chemouil D, Filali M and Strecker M (2005). Towards formalising AADL in Proof Assistants, Electronic Notes in Theoretical Computer Science (ENTCS), 141:3, (153-169), Online publication date: 1-Dec-2005.
  251. Bracher S and Krishnan P Enabling security testing from specification to code Proceedings of the 5th international conference on Integrated Formal Methods, (150-166)
  252. ACM
    Chaudhuri A and Abadi M Formal security analysis of basic network-attached storage Proceedings of the 2005 ACM workshop on Formal methods in security engineering, (43-52)
  253. ACM
    Grov G Verifying the correctness of hume programs Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, (444-447)
  254. ACM
    Martin M, Sorin D, Beckmann B, Marty M, Xu M, Alameldeen A, Moore K, Hill M and Wood D (2005). Multifacet's general execution-driven multiprocessor simulator (GEMS) toolset, ACM SIGARCH Computer Architecture News, 33:4, (92-99), Online publication date: 1-Nov-2005.
  255. Bhattacharya R, German S and Gopalakrishnan G Symbolic partial order reduction for rule based transition systems Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (332-335)
  256. Junqueira F and Marzullo K Coterie availability in sites Proceedings of the 19th international conference on Distributed Computing, (3-17)
  257. Rekhis S and Boudriga N A temporal logic-based model for forensic investigation in networked system security Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (325-338)
  258. ACM
    Chen K, Sztipanovits J and Neema S Toward a semantic anchoring infrastructure for domain-specific modeling languages Proceedings of the 5th ACM international conference on Embedded software, (35-43)
  259. Filali M, Issarny V, Mauran P, Padiou G and Quéinnec P Maximal group membership in ad hoc networks Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics, (51-58)
  260. van den Brand M Applications of the ASF+SDF meta-environment Proceedings of the 2005 international conference on Generative and Transformational Techniques in Software Engineering, (278-296)
  261. Gruhn V and Schäfer C Architecture description for mobile distributed systems Proceedings of the 2nd European conference on Software Architecture, (239-246)
  262. Lin S, Pan A, Zhang Z, Guo R and Guo Z WiDS Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10, (17-17)
  263. ACM
    REKHIS S and BOUDRIGA N A formal logic-based language and an automated verification tool for computer forensic investigation Proceedings of the 2005 ACM symposium on Applied computing, (287-291)
  264. Arvind , Nikhil R, Rosenband D and Dave N High-level synthesis Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (775-782)
  265. Tasiran S, Yu Y and Batson B (2004). Linking Simulation with Formal Verification at a Higher Level, IEEE Design & Test, 21:6, (472-482), Online publication date: 1-Nov-2004.
  266. Seceleanu C and Seceleanu T Modular Design of Reactive Systems Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01, (265-271)
  267. ACM
    Edwards J, Jackson D, Torlak E and Yeung V Faster constraint solving with subtypes Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, (232-242)
  268. ACM
    Edwards J, Jackson D, Torlak E and Yeung V (2004). Faster constraint solving with subtypes, ACM SIGSOFT Software Engineering Notes, 29:4, (232-242), Online publication date: 1-Jul-2004.
  269. ACM
    Zhang X, Park J, Parisi-Presicce F and Sandhu R A logical specification for usage control Proceedings of the ninth ACM symposium on Access control models and technologies, (1-10)
  270. Bluespec System Verilog Proceedings of the Second ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (69-70)
  271. Kurki-Suonio R (2003). Action systems in incremental and aspect-oriented modeling, Distributed Computing, 16:2-3, (201-217), Online publication date: 1-Sep-2003.
  272. Abrial J, Cansell D and Méry D Formal derivation of spanning trees algorithms Proceedings of the 3rd international conference on Formal specification and development in Z and B, (457-476)
  273. ACM
    Tasiran S, Yu Y and Batson B Using a formal specification and a model checker to monitor and direct simulation Proceedings of the 40th annual Design Automation Conference, (356-361)
Contributors
  • Microsoft Research

Recommendations