Using Event-B for Critical Device Software Systems

Nonfiction, Science & Nature, Mathematics, Logic, Computers, Programming, Software Development, General Computing
Cover of the book Using Event-B for Critical Device Software Systems by Neeraj Kumar Singh, Springer London
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Neeraj Kumar Singh ISBN: 9781447152606
Publisher: Springer London Publication: June 19, 2013
Imprint: Springer Language: English
Author: Neeraj Kumar Singh
ISBN: 9781447152606
Publisher: Springer London
Publication: June 19, 2013
Imprint: Springer
Language: English

Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation).

This is assessed and evaluated via a standard case study: the cardiac pacemaker. Additionally a formalisation of an Electrocardiogram (ECG) is used to identify anomalies in order to improve existing medical protocols. This allows the key issue - that formal methods are not currently integrated into established critical systems development processes - to be discussed in a highly effective and informative way.

Using Event-B for Critical Device Software Systems serves as a valuable resource for researchers and students of formal methods. The assessment of critical systems development is applicable to all industries, but engineers and physicians from the health domain will find the cardiac pacemaker case study of particular value.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation).

This is assessed and evaluated via a standard case study: the cardiac pacemaker. Additionally a formalisation of an Electrocardiogram (ECG) is used to identify anomalies in order to improve existing medical protocols. This allows the key issue - that formal methods are not currently integrated into established critical systems development processes - to be discussed in a highly effective and informative way.

Using Event-B for Critical Device Software Systems serves as a valuable resource for researchers and students of formal methods. The assessment of critical systems development is applicable to all industries, but engineers and physicians from the health domain will find the cardiac pacemaker case study of particular value.

More books from Springer London

Cover of the book Pediatric Heart Sounds by Neeraj Kumar Singh
Cover of the book Using Game Theory to Improve Safety within Chemical Industrial Parks by Neeraj Kumar Singh
Cover of the book Continence by Neeraj Kumar Singh
Cover of the book High-Performance Scientific Computing by Neeraj Kumar Singh
Cover of the book Vehicle-Manipulator Systems by Neeraj Kumar Singh
Cover of the book Clinical Urologic Endocrinology by Neeraj Kumar Singh
Cover of the book Mathematical Tools for Data Mining by Neeraj Kumar Singh
Cover of the book Mapping Scientific Frontiers by Neeraj Kumar Singh
Cover of the book Cloud Computing by Neeraj Kumar Singh
Cover of the book Recent Advances in System Reliability by Neeraj Kumar Singh
Cover of the book Disaster Medicine by Neeraj Kumar Singh
Cover of the book Bone Scanning in Clinical Practice by Neeraj Kumar Singh
Cover of the book Model-Based Fault Diagnosis Techniques by Neeraj Kumar Singh
Cover of the book Developing Insights in Cartilage Repair by Neeraj Kumar Singh
Cover of the book Service Parts Management by Neeraj Kumar Singh
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy