- School of Engineering
London South Bank University
Borough Road
London SE1 0AA
United Kingdom - +44 (0) 20 7815 7462
- Computer Science, Engineering, Software Engineering, Semantic Web, Social Networking, Software Engineering education, and 102 moreSafety-Critical Systems, Software Testing, Computer Science Education, Formal Methods (Formal Verification), Formal methods, Information Science, Museum Informatics, Museums, Museum Studies, Shared-Variable Concurrency, Informatics, Software Design, Online Communities, Virtual Communities, Online Communities of Practice, Communities of practice, Information Visualisation, Specification, Formal Specification, Logic Programming, Prolog, Decompilation, Software Prototyping, Z Notation, Compilation, Occam, Verilog, Safety-critical software, Interactive Multimedia Applications, Information Technology, Computer Vision, Digital Media, Digital Culture, Human Computer Interaction, Digital Arts, Interdisciplinarity, Information Visualization, Media Art, Computer Arts, Immersive Environments, 3D Computer Graphics Programming, Experimental Media Arts, Electronic Media, New Media Arts, Media Arts, Arts, Computer Graphics, New Media Art, Simulation (Computer Science), Interactive and Digital Media, Denotational Semantics, Visual Culture, 3D visualisation, New Media Art & Emerging Practices, Visualization, Social Media, Visual Arts, Business, Computers in Graphic Design, Operational Semantics, Interdisciplinary research (Social Sciences), Unifying Theories of Programming, Interactive Media, Instruction Set Architecture, History of Technology, History Of Computing, History of Science and Technology, Twitter, History of Science, Bodies of Knowledge, Formal Semantics, Algebraic Semantics, Algebraic Laws, Concurrency, Digital Museum, Museum Interpretation, Museum Education, Web Accessibility, Virtual Community, Alan Turing, Design, Industrial Engineering, Software Development, Software, Philosophy of Computer Science, Theoretical Computer Science, Mathematics and Computer Science, Computer Science Engineering, Verification (Computer Science), Software Verification and Validation, Software Testing (Computer Science), Verification and Validation, Formal Methods (Formal Methods), Formal Verification, Software systems verification, Testing And Verification, Specification-based Testing, Computer Ethics, Public Understanding Of Science, Collections Access, Issues of Hci, and Computer Engineeringedit
- Emeritus Professor at London South Bank University (London, UK), Adjunct Professor at Southwest University (Chongqing... moreEmeritus Professor at London South Bank University (London, UK), Adjunct Professor at Southwest University (Chongqing, China), and Chairman of Museophile Limited (Oxford, UK). Previously Professor of Computer Science at Birmingham City University (2013-2015), Visiting Professor at the University of Westminster, 2010-2012 and Visiting Professor at King's College London, 2007-2009.edit
This paper extends a companion paper on compilation for target platforms with hidden deterministic hardware aliasing to generate aliasing as well as compensate for it, in so-called 'chaotic' compilation. That may be applied in... more
This paper extends a companion paper on compilation for target platforms with hidden deterministic hardware aliasing to generate aliasing as well as compensate for it, in so-called 'chaotic' compilation. That may be applied in encrypted computing to statistically hide any information inadvertently introduced by a human programmer. A prototype compiler implementing the technology currently covers all of ANSI C except longjmp/setjmp, and this paper sketches a proof that it protects against polynomial complexity attacks on runtime data.
Research Interests:
Research Interests:
Research Interests:
Research Interests: History, Cultural Studies, Geography, Computer Science, Cultural Heritage, and 15 moreMaltese, Heritage Studies, Heritage Tourism, Interaction Design, Graphic Design, Cultural Tourism, Cultures and heritage tourism, Medieval Malta, Heritage, iPhone applications, Mobile apps, Malta, iPhone apps development, History of Malta, and arXiv
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Monitoring communities has become increasingly easy on the web as the number of visualisation tools and amount of data available about communities increase. It is possible to visualise connections on social and professional networks such... more
Monitoring communities has become increasingly easy on the web as the number of visualisation tools and amount of data available about communities increase. It is possible to visualise connections on social and professional networks such as Facebook in the form of mathematical graphs. It is also possible to visualise connections between authors of papers. In particular, Microsoft Academic Search now has a large corpus of information on publications, together with author and citation information, that can be visualised in a number of ways. In mathematical circles, the concept of the "Erd\H{o}s number" has been introduced, in honour of the Hungarian mathematician Paul Erd\H{o}s, measuring the "collaborative distance" of a person away from Erd\H{o}s through links by co-author. Similar metrics have been proposed in other fields, including acting. The possibility of exploring and visualising such links in arts fields is proposed in this paper.
Research Interests:
Research Interests:
Over the past few years we have articulated theory that describes ‘encrypted computing’, in which data remains in encrypted form while being worked on inside a processor, by virtue of a modified arithmetic. The last two years have seen... more
Over the past few years we have articulated theory that describes ‘encrypted computing’, in which data remains in encrypted form while being worked on inside a processor, by virtue of a modified arithmetic. The last two years have seen research and development on a standards-compliant processor that shows that near-conventional speeds are attainable via this approach. Benchmark performance with the US AES-128 flagship encryption and a 1GHz clock is now equivalent to a 433MHz classic Pentium, and most block encryptions fit in AES's place. This summary article details how user data is protected by a system based on the processor from being read or interfered with by the computer operator, for those computing paradigms that entail trust in data-oriented computation in remote locations where it may be accessible to powerful and dishonest insiders. We combine: (i) the processor that runs encrypted; (ii) a slightly modified conventional machine code instruction set architecture with w...
Research Interests:
Research Interests:
The hardware description language Verilog has been standardized and widely used in industry. Multithreaded Discrete Event Simulation Language (MDESL) is a Verilog-like language and it contains a rich variety of interesting features such... more
The hardware description language Verilog has been standardized and widely used in industry. Multithreaded Discrete Event Simulation Language (MDESL) is a Verilog-like language and it contains a rich variety of interesting features such as the event-driven computation and shared-variable concurrency as well as the realtime feature. In this paper, we present the denotational semantics for MDESL based on UTP. First a discrete time semantic model is proposed to describe the observation-oriented semantics for MDESL. The observations record the change of variables of atomic actions over time. Then the healthy formulae are defined to denote all different behaviors of programs and the semantics of programs is expressed in terms of healthy formulae. In addition, we demonstrate some interesting properties about the MDESL programs expressing as algebraic laws and their proofs are supported by our formalized denotational semantics. Our theoretical approach is complemented by a practical one, w...
Research Interests:
Research Interests: Visual Arts and The Arts
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
This Oral History of Museum Computing is provided by Jonathan Bowen, and was recorded on the 1st of March, 2021, by Paul Marty and Kathy Jones. It is shared under a Creative Commons Attribution 4.0 International license (CC-BY), which... more
This Oral History of Museum Computing is provided by Jonathan Bowen, and was recorded on the 1st of March, 2021, by Paul Marty and Kathy Jones. It is shared under a Creative Commons Attribution 4.0 International license (CC-BY), which allows for unrestricted reuse provided that appropriate credit is given to the original source. For the recording of this oral history, please see
https://youtu.be/QpXSUAWWZ_c
.
https://youtu.be/QpXSUAWWZ_c
.
Research Interests:
This paper looks at key elements of global culture that are driving a new paradigm shift in museums causing them to question their raison d'être, their design and physical space, recognizing the need to accommodate visitor interaction... more
This paper looks at key elements of global culture that are driving a new paradigm shift in museums causing them to question their raison d'être, their design and physical space, recognizing the need to accommodate visitor interaction and participation, and to reprioritize institutional outcomes and goals reexamining their priorities. As heritage sharing in online spaces reaches across national, political, and social boundaries on platforms and networks, this has been driven by museum engagement with Internet life during the pandemic. Museum relationships and interactions with communities both local and global, continue to challenge core values and precepts, leading to radical changes in how museums define their roles and responsibilities. In this new cultural landscape, museums are responding to human digital identity in a tidal wave of human interactions on the Internet, from social media to online sharing of images and videos. This is revealing shared perspectives on cultural...
Research Interests:
Research Interests:
Hardware aliasing occurs when the same logical address can access different physical memory locations. This is a problem for software on some embedded systems and more generally when hardware becomes faulty in irretrievable locations,... more
Hardware aliasing occurs when the same logical address can access different physical memory locations. This is a problem for software on some embedded systems and more generally when hardware becomes faulty in irretrievable locations, such as on a Mars Lander. We show how to work around the hardware problem with software logic, compiling code so it works on any platform with hardware aliasing with hidden determinism. That means: (i) a copy of an address accesses the same location, and (ii) repeating an address calculation exactly will repeat the same access again. Stuck bits can mean that even adding zero to an address can make a difference in that environment so nothing but a systematic approach could work.
Research Interests:
Research Interests:
ABSTRACT
Research Interests:
The use of formal methods is fraught with difficulties, any one of which could cause the downfall of a project depending on their use. We enumerate a number of pitfalls which should be avoided in order to help make sure a formal methods... more
The use of formal methods is fraught with difficulties, any one of which could cause the downfall of a project depending on their use. We enumerate a number of pitfalls which should be avoided in order to help make sure a formal methods project is successful, together with some guidance on the use of formal methods in the overall design process. While this cannot ensure favourable results, it will help to avoid failure, which is ail too easy an outcome (see, for example (Neil et al, 1998)).
Research Interests:
Research Interests:
ABSTRACT
Research Interests:
Research Interests:
Research Interests: Algebra, Computer Science, Programming Languages, Compilers, Computer Engineering, and 15 moreCorpus compilation and design, Compiler Construction, Formal methods, Computer Hardware, Hardware Description Languages, Formal Semantics, Compilation, Hardware Design, Asynchronous Communication, Acknowledgement, Formal Verification, Compilers and Programming Languages, Compiler Design, Modular Design, and Programming language
Research Interests: Algebra, Probability Theory, Computer Science, Concurrency Theory, Concurrent Programming Languages, and 15 moreFormal methods, Formal Semantics, Probability, Applied Probability, Probabilistic Logic, Denotational Semantics, Concurrency, Formal languages, Concurrent Programming, Formal language, Bisimulation, Operational Semantics, Concurrency Control, Action Semantics, and Programming language
Research Interests: Computer Science, Software Engineering, Formal Methods (Formal Verification), Semantics, Web Services, and 11 moreFormal methods, Formal Semantics, BPEL, WS-BPEL, Denotational Semantics, Unifying Theories of Programming, Operational Semantics, Web service composition, Web Service, Semantic model, and Action Semantics
Research Interests:
Research Interests: Algebra, Computer Science, Software Engineering, Formal Methods (Formal Verification), Web Design, and 15 moreSemantics, Web Technologies, Web Services, Formal methods, Computational Semantics, BPEL, Denotational Semantics, Operational Semantics, Algebraic Semantics, Web service composition, Web Service, Action Semantics, Programming language, Transition Systems, and SOUNDNESS
Research Interests: Computer Science, Software Engineering, Formal Methods (Formal Verification), Software Process Improvement and Assessment, Software Engineering education, and 12 moreIndustrial Engineering, Formal methods, Ten Commandments, Best practice, Formal method, Z Notation, ASM, Abstract State Machines, Industrial Application, B Method, Dependable Systems, and Birthday
EVA 2010 is co-sponsored by the Computer Arts Society and BCS, The Chartered Institute for IT, of which the Computer Arts Society is a specialist group. The EVA conference series has established itself as a natural home from which to... more
EVA 2010 is co-sponsored by the Computer Arts Society and BCS, The Chartered Institute for IT, of which the Computer Arts Society is a specialist group. The EVA conference series has established itself as a natural home from which to explore the richly interdisciplinary and constantly evolving world of digital visualisation. Nothing illustrates this more than the great scope, depth and diversity of the papers contained within this year's proceedings. The latest research in digital arts and new media is explored, with ...
Research Interests: Engineering, Computer Science, Computer Graphics, Human Computer Interaction, Information Technology, and 15 moreComputer Vision, Digital Humanities, Digital Media, Experimental Media Arts, Digital Archaeology, Computer Games Technology, Computers in Graphic Design, Digital Culture, Computer Arts, Haptics, Electronic Media, Arts, Digital Arts, HCI, and Immersive Environments
The dramatic increase in the popularity of the Internet, largely brought about by the World Wide Web, has significantly increased the need for environments to support remote collaboration, learning, and research. Existing network... more
The dramatic increase in the popularity of the Internet, largely brought about by the World Wide Web, has significantly increased the need for environments to support remote collaboration, learning, and research. Existing network technologies can be used to partly service the requirement for self-paced teaching, but a greater level of tool integration is needed to support directed learning and collaboration. This paper discusses work done to marry traditional text-based conferencing with the facilities available through a graphical ...
Research Interests:
Virtual communities have become increasingly popular for the general public, using electronic mailing lists, newsgroups, WWeb-based forums, chat rooms, etc. However, it appears that online forums are not well integrated into the sphere of... more
Virtual communities have become increasingly popular for the general public, using electronic mailing lists, newsgroups, WWeb-based forums, chat rooms, etc. However, it appears that online forums are not well integrated into the sphere of museums. Curators have therefore not capitalized on widening their mandate and engaging visitors as well as museum professionals themselves in effective online interaction. This paper presents a survey of existing museum-related forums available for discussion by museum professionals and the general public with an interest in museums. Some of the software and facilities available to museums for the establishment and maintenance of mailing lists, WWeb-based discussion forums and more innovative service like WWeb logs, often freely available, are also explored. A museum discussion forum facility has been implemented experimentally (see under http://forums.museophile.net) using open source software. As well as local forums, this integrates topical information of interest to museum personnel from a wide range of online sources. Finally, some thoughts for the future are discussed.
Research Interests: Computer Science, Communication, Informatics, Blogs, Museum Studies, and 15 moreOnline Communities, Community Development, Mass Communication, Collaboration, Collaborative Virtual Environments, Museum Informatics, Online Groups, Online Education, Museology, Communication Studies, Online Discussions, Online Discussion, Electronic mail, Mailing Lists, and Discussion forum
Research Interests:
In September 2023, it is planned to celebrate the 80th birthday of Prof. Jifeng He, an important contributor to the field of formal methods. We provide a brief biography (Bowen & Zhu, 2023) followed by a description of the Festschrift... more
In September 2023, it is planned to celebrate the 80th birthday of Prof. Jifeng He, an important contributor to the field of formal methods. We provide a brief biography (Bowen & Zhu, 2023) followed by a description of the Festschrift volume that is to be published (Bowen et al. 2023). The associated symposium will be held in hybrid mode. We intend to provide FACS members the possibility of registering for online access to the symposium and also time-limited free access to the proceedings. Further information is available on the FACS website (http://facs.bcs.org).
Research Interests: Computer Science, Concurrency Theory, Parallel Computing, Software Engineering, Formal Methods (Formal Verification), and 13 moreReal-time Systems, Software Development, Formal methods, Formal Semantics, Computer Programming, Programming, Formal Specification, Shanghai, Formal Verification, Unifying Theories of Programming, University of Oxford, Festschrift, and Chinese Academy of Sciences
JB: I am a member of the History of Mathematics Forum which meets periodically at Queen’s College in Oxford to discuss work in progress relating to mathematical history in general, including some computer science. For example, I gave a... more
JB: I am a member of the History of Mathematics Forum which meets periodically at Queen’s College in Oxford to discuss work in progress relating to mathematical history in general, including some computer science. For example, I gave a talk on Alan Turing’s connections with Oxford, which resulted in feedback from Chris Hollings, co-organizer of the Forum. This led to correspondence with a former student of Queen’s College, Prof. Ioan James, who remembered attending a mathematical talk by Turing concerning his concept of a Turing machine (Bowen, 2022); in follow-up communication, I learned that Turing delivered the lecture in 1950 at Magdalen College, Oxford (James, 2022).
In November 2022, Chris Hollings sent me a query from Bonhams auction house about a newly discovered two-page hand-written untitled manuscript by Alan Turing, consisting of some draft mathematical notes and seemingly written during the Second World War. These were found among the papers of Rolf Noskwith (1919–2017), a fellow Bletchley Park codebreaker who worked side by side with Turing. A sample of the manuscript is included below, enhanced for readability from a yellowing image provided by Bonhams.
In November 2022, Chris Hollings sent me a query from Bonhams auction house about a newly discovered two-page hand-written untitled manuscript by Alan Turing, consisting of some draft mathematical notes and seemingly written during the Second World War. These were found among the papers of Rolf Noskwith (1919–2017), a fellow Bletchley Park codebreaker who worked side by side with Turing. A sample of the manuscript is included below, enhanced for readability from a yellowing image provided by Bonhams.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search: The ACM Digital Library The Guide. ...
Research Interests:
"The Dictionary of Computing gives the following (abridged) defi nitions for a compiler and decompiler (or reverse compiler): compiler A program that translates high-level language into absolute code . . . decompiler A program that... more
"The Dictionary of Computing gives the following (abridged) definitions for a compiler and decompiler (or reverse compiler):
compiler A program that translates high-level language into absolute code . . .
decompiler A program that attempts to . . . translate back from machine code to something resembling the source language. The task is difficult and not often attempted.
The following sections are intended to show how a decompiler may be constructed given only a knowledge of or access to the specification for a forward compiler, and some facility with Prolog or other high-level languages. It is easy to do and
should be attempted more often.
Decompilation is only useful, of course, if the object code is available and it is
required to reproduce the higher level `original' as an intermediate stage to aid understanding
or restructuring. The decompiled code can then be abstracted to a specification
by other techniques developed by the REDO project,"
compiler A program that translates high-level language into absolute code . . .
decompiler A program that attempts to . . . translate back from machine code to something resembling the source language. The task is difficult and not often attempted.
The following sections are intended to show how a decompiler may be constructed given only a knowledge of or access to the specification for a forward compiler, and some facility with Prolog or other high-level languages. It is easy to do and
should be attempted more often.
Decompilation is only useful, of course, if the object code is available and it is
required to reproduce the higher level `original' as an intermediate stage to aid understanding
or restructuring. The decompiled code can then be abstracted to a specification
by other techniques developed by the REDO project,"
Research Interests:
Alan Turing has a rightful claim to the title of father of modern computing. He laid the theoretical groundwork for a universal machine that models a computer in its most general form before World War II. During the war, Turing was... more
Alan Turing has a rightful claim to the title of father of modern computing. He laid the theoretical groundwork for a universal machine that models a computer in its most general form before World War II. During the war, Turing was instrumental in developing and influencing actual computing devices that have been said to have shortened the war by up to two years by decoding encrypted enemy messages that were believed by others to be unbreakable. Unlike some theoreticians, he was willing to be involved with practical aspects, and was as happy to wield a soldering iron as he was to wrestle with a mathematical problem, normally from a unique angle compared to others.
Research Interests:
How have the formal methods commandments fared over the past decade? Are they still valid in the current industrial setting, and have attitudes toward formal methods improved? The authors revisit their ten maxims to answer these questions.
Research Interests:
This chapter introduces the concept of a Virtual Organization (VO), using the Internet to link geographically separated participants in an efficient and novel manner. In particular, the chapter contrasts the attributes of Project VOs and... more
This chapter introduces the concept of a Virtual Organization (VO), using the Internet to link geographically separated participants in an efficient and novel manner. In particular, the chapter contrasts the attributes of Project VOs and Community VOs. The former tend to be more formal and arise for a particular collaborative goal with a limited lifetime. The latter are less formal and more open-ended, with a less specific purpose, largely aimed at developing an online community as an end in itself. The features of Project and Community VOs are compared and the various technologies are discussed. Two case studies are presented as examples. This is a rapidly changing area with new technologies becoming rapidly available, but the underlying concepts and reasons for the existence of VOs in the support of virtual collaborative practice remain more stable.
Research Interests: Organizational Behavior, Information Systems, Information Science, Information Technology, Community Informatics, and 14 moreOrganizational Communication, Organizational Theory, Informatics, Project Management, Organizational Culture, Online Communities, Community Development, Virtual Communities, Community Organizing, Collaboration, Collaborative Virtual Environments, Collaborative Systems, Collaboration Informatics, and Collaboration Technology
In the past decade, museums have experienced a revolution with the arrival of new technologies, capable of enhancing their visitors’ experiences by introducing multimedia content. Amid these new technologies, website and computer-based... more
In the past decade, museums have experienced a revolution with the arrival of new technologies, capable of enhancing their visitors’ experiences by introducing multimedia content. Amid these new technologies, website and computer-based interactives in the gallery have augmented exhibitions to provide additional educational material. However, the web is mainly suitable for access to information before, after or often even instead of visiting an exhibition or museum. A kiosk provides a physically fixed facility that can be used during a visit to an exhibition, but only for part of it generally. In contrast, a multimedia tour delivered through a handheld device allows the visitor to gain information at any point during the visit and in any order, without interfering with the aesthetics of the gallery. This means it has some unique properties that could be beneficial, if used suitably.
http://www.readinglists.manchester.ac.uk/items/19385D8F-E893-267A-33DD-20742D8A4F8B.html
http://www.readinglists.manchester.ac.uk/items/19385D8F-E893-267A-33DD-20742D8A4F8B.html
Research Interests: Informatics, Museum learning, Web Design, Museum Studies, Digital Museum, and 35 moreOnline Museum, Mobile Learning, Wireless Communications, Mobile Media, Multimedia, Learning Technology, Mobile Technology, Narrative and interpretation, Museum Education, Interactive Narrative, Interactive Digital Storytelling, Multimedia Communications, Museum Informatics, Interactive and Digital Media, Interactive Media, Multimedia Learning, Museums and Exhibition Design, Art and Interpretation, Museum Interpretation, Mobile social networking, Mobile Web 2.0, Mobile Communication, Museology, Mobile application development, Mobile Computing, Interactive Multimedia Applications, Mobile HCI, Interactive Multimedia, Hypermedia, Multimedia in Education, Kiosk, Multimedia Design, Museum Guides, Kiosk technology, and Mobile and Location-Based Media
We consider the design and provision of websites with respect to gender issues from various perspectives. A general view of the field is given and educational issues are specifically considered in relation to gender differences in the use... more
We consider the design and provision of websites with respect to gender issues from various perspectives. A general view of the field is given and educational issues are specifically considered in relation to gender differences in the use of IT as an effective educational aid, especially by children. Human-Computer Interaction (HCI) models at different levels of abstraction are presented, together with how gender issues could impinge at each of these levels. A number of examples, both from the commercial and cultural fields, are discussed as design case studies of home pages for websites that exhibit gender-related orientation. Finally, looking to the future, online gaming is discussed in the context of usage. It is hoped that the guidance provided here will help minimize any gender discrimination on websites with respect to their interfaces, increasing general accessibility in the process.
Research Interests: Computer Science, Human Computer Interaction, Computing In Social Sciences, Arts And Humanities, Professions, Information Technology, Gender Studies, and 20 moreMulticulturalism, Education, Web 2.0, Informatics, Web Design, Usability, Design education, The Social Web, Inclusive Design, Gender, Gender Equality, ICT in Education, Web Accessibility, Web Studies, Gender and Work, Multicultural Education, Web Applications, Usability and user experience, Inclusive Education, and HCI
Research Interests:
Research Interests:
Research Interests:
This appendix provides some details on how to access information on Z, particularly electronically. It has been generated from a message that is updated and sent out monthly on international computer networks. This on-line information is... more
This appendix provides some details on how to access information on Z, particularly electronically. It has been generated from a message that is updated and sent out monthly on international computer networks. This on-line information is available on-line on the following World Wide Web (WWW) hypertext page where it is split into convenient sections and updated each month:
http://www.faqs.org/faqs/z-faq/
http://www.faqs.org/faqs/z-faq/
Research Interests:
""Electronic Visualisation in Arts and Culture explores a variety of new theory and technologies, including devices and techniques for motion capture for music and performance, advanced photographic techniques, computer generated images... more
""Electronic Visualisation in Arts and Culture explores a variety of new theory and technologies, including devices and techniques for motion capture for music and performance, advanced photographic techniques, computer generated images derived from different sources, game engine software, airflow to capture the motions of bird flight and low-altitude imagery from airborne devices.
The international authors of this book are practising experts from universities, art practices and organisations, research centres and independent research. They describe electronic visualisation used for such diverse aspects of culture as airborne imagery, computer generated art based on the autoimmune system, motion capture for music and for sign language, the visualisation of time and the long term preservation of these materials. Selected from the EVA London conferences from 2009-2012, held in association with the Computer Arts Society of the British Computer Society, the authors have reviewed, extended and fully updated their work for this state-of-the-art volume.
""
The international authors of this book are practising experts from universities, art practices and organisations, research centres and independent research. They describe electronic visualisation used for such diverse aspects of culture as airborne imagery, computer generated art based on the autoimmune system, motion capture for music and for sign language, the visualisation of time and the long term preservation of these materials. Selected from the EVA London conferences from 2009-2012, held in association with the Computer Arts Society of the British Computer Society, the authors have reviewed, extended and fully updated their work for this state-of-the-art volume.
""
Research Interests: Cultural Studies, Human Computer Interaction, Visual Studies, Media and Cultural Studies, Digital Humanities, and 34 moreVisualization, Cultural Heritage, Digital Media, Visual Culture, Information Visualization, Impact of Interface Design, Interaction Design, Media Arts, Imaging, Digital Culture, Culture, Culture Studies, Humanities Visualization, Multimodal Interaction, User Interface, Interface Design, Visual Communication, Electronic Media, Knowledge Visualization, Arts, 3D visualisation, Digital imaging, Digital Arts, Information Visualisation, Multimodality, Computing, Visual Arts, Archaeological Visualisation, Data Visualization, Data Visualisation, Multimodal Communication, Visualisation, Digital Imaging Devices, and Computer Interfacing
The last decade has witnessed a modest but sustained increase in researching and applying formal methods. A number of well cited success stories are now available and provide strong evidence that formal methods can be effective and... more
The last decade has witnessed a modest but sustained increase in researching and applying formal methods. A number of well cited success stories are now available and provide strong evidence that formal methods can be effective and deployed in industrial-scale applications.
Through fundamental contributions from leading researchers, this book provides further evidence of the use of formal methods in the areas of requirements, design, modelling and implementation, verification and validation. The self-contained chapters are views from experts in these areas, providing readers with rich background information and a diverse breadth of specialist material.
This authoritative collection of views provides a snapshot of the field and will be of considerable interest to researchers and professionals seeking a perspective on fundamental underpinnings of formal methods and current hot topics in the field.
The website www.fmsand.info is a useful resource, providing material associated with the book and links to further related information.
Content Level » Research
Keywords » Formal Methods - Formal Specification - Refinement - Semantics - Z Notation
Related subjects » Software Engineering - Theoretical Computer Science
TABLE OF CONTENTS
Domain Engineering.- Program Verification and System Dependability.- The Abstract State Machines Method for High-Level System Design and Analysis.- Applications and Methodology of vZ.- The Computer Ate my Vote.- Formal Methods for Biomechanical Signalling Pathways.- Separation Logic and Concurrency.- Programming Language Description Languages.
Through fundamental contributions from leading researchers, this book provides further evidence of the use of formal methods in the areas of requirements, design, modelling and implementation, verification and validation. The self-contained chapters are views from experts in these areas, providing readers with rich background information and a diverse breadth of specialist material.
This authoritative collection of views provides a snapshot of the field and will be of considerable interest to researchers and professionals seeking a perspective on fundamental underpinnings of formal methods and current hot topics in the field.
The website www.fmsand.info is a useful resource, providing material associated with the book and links to further related information.
Content Level » Research
Keywords » Formal Methods - Formal Specification - Refinement - Semantics - Z Notation
Related subjects » Software Engineering - Theoretical Computer Science
TABLE OF CONTENTS
Domain Engineering.- Program Verification and System Dependability.- The Abstract State Machines Method for High-Level System Design and Analysis.- Applications and Methodology of vZ.- The Computer Ate my Vote.- Formal Methods for Biomechanical Signalling Pathways.- Separation Logic and Concurrency.- Programming Language Description Languages.
Research Interests:
This book constitutes the thoroughly refereed and peer-reviewed outcome of the Formal Methods and Testing (FORTEST) network - formed as a network established under UK EPSRC funding that investigated the relationships between formal (and... more
This book constitutes the thoroughly refereed and peer-reviewed outcome of the Formal Methods and Testing (FORTEST) network - formed as a network established under UK EPSRC funding that investigated the relationships between formal (and semi-formal) methods and software testing - now being a subject group of two BCS Special Interest Groups: Formal Aspects of Computing Science (BCS FACS) and Special Interest Group in Software Testing (BCS SIGIST).
Each of the 12 chapters in this book describes a way in which the study of formal methods and software testing can be combined in a manner that brings the benefits of formal methods (e.g., precision, clarity, provability) with the advantages of testing (e.g., scalability, generality, applicability).
Each of the 12 chapters in this book describes a way in which the study of formal methods and software testing can be combined in a manner that brings the benefits of formal methods (e.g., precision, clarity, provability) with the advantages of testing (e.g., scalability, generality, applicability).
Research Interests: Quality Assurance Engineering, Computer Science, Software Engineering, Formal Methods (Formal Verification), Quality Management, and 14 moreSoftware Testing, Software Development, Formal Methods (Formal Methods), Software Engineering education, Verification and Validation, Verification (Computer Science), Formal methods, Testing And Verification, Testing, Software Verification and Validation, Test, Software, Z Notation, and Formal methods (Z notation)
This unique book concentrates specifically on industrial applications. The authors provide hands-on experience and guidance for those who need to apply formal methods successfully in this context. Each chapter is written by an expert in... more
This unique book concentrates specifically on industrial applications. The authors provide hands-on experience and guidance for those who need to apply formal methods successfully in this context. Each chapter is written by an expert in software engineering or formal methods, and contains background information, introductions to the techniques being used, actual fragments of formalized components, details of results and an analysis of the overall approach. It provides specific details on how to produce high-quality software that comes in on time and within budget.
Research Interests:
This volume provides the reader with a comprehensive introduction to system specification an d design methods, with particular emphasis on structured and formal methods, method integration, concurrency and safety-critical systems. It... more
This volume provides the reader with a comprehensive introduction to system specification an d design methods, with particular emphasis on structured and formal methods, method integration, concurrency and safety-critical systems. It contains new material by Jonathan Bowen and Michael Hinchey, along with reprints of classic articles on high-integrity systems which have never bef ore appeared in a single volume. Among these classic articles are contributions from such leading names as Leslie Lamport, Nancy Leveson and C.A.R. Hoare.
High-Integrity System Specification and Design provides practitioners and researchers with convenient access to a range of essential essays — both classic and state-of-the-art — in a single volume. It will provide them with details of specification and design approaches for this type of system, an overview of the development process, and evidence of how various classes of high-integrity system may be approached and developed successfully.
The volume is also available from the IEEE Computer Society Press.
Jonathan P. Bowen and Mike Hinchey (University of Nebraska at Omaha). Springer-Verlag, London, FACIT series, April 1999. ISBN 3-540-76226-4. (xix+701 pages) Co-author of the following reprinted papers:Seven More Myths of Formal Methods, Jonathan P. Bowen and Mike Hinchey, pages 153-165.Ten Commandments of Formal Methods, Jonathan P. Bowen and Mike Hinchey, pages 217-230.Safety-Critical Systems, Formal Methods and Standards, Jonathan P. Bowen and Victoria Stavridou, pages 485-528.
Table of contents
Preface
Parts:
Specification and Design
Structured Methods
Formal Methods
Object-Orientation
Concurrent and Distributed Systems
Real-Time and Safety-Critical Systems
Integrating Methods
Implementation
CASE
Glossary
Bibliography
Index
List of reprints
The following papers are included:
Grady Booch. Object-Oriented Development. IEEE Transactions on Software Engineering, 12(2):211–221, February 1986.Jonathan P. Bowen and Michael G. Hinchey. Ten Commandments of Formal Methods. IEEE Computer, 28(4):56–63, April 1995.
Jonathan P. Bowen and Michael G. Hinchey. Seven More Myths of Formal Methods. IEEE Software, 12(7):34–41, July 1995.
Jonathan P. Bowen and Victoria Stavridou. Formal Methods, Safety-Critical Systems and Standards. Software Engineering Journal, 8(4):189–209, July 1993.
Frederick P. Brooks, Jr. No Silver Bullet: Essence and Accidents of Software Engineering. IEEE Computer, 20(4):10–19, April 1987. First published in H.-J. Kugler (ed.), Information Processing '86, Elsevier Science Publishers B.V. (North-Holland).John R. Cameron. An Overview of JSD. IEEE Transactions on Software Engineering, 12(2):222–240, February 1986.
Eliott J. Chikofsky and B.L. Rubenstein. CASE: Reliability Engineering for Information Systems. IEEE Software, 5(2):11–16, March 1988.
Robert G. Fichman and Chris F. Kemerer. Object-Oriented and Conventional Analysis and Design Methodologies. IEEE Computer, 25(10):22–39, October 1992.
Norbert E. Fuchs. Specifications are (Preferably) Executable. Software Engineering Journal, 7(5):323–334, September 1992.
Susan Gerhart, Dan Craigen and Ted Ralston. Experience with Formal Methods in Critical Systems. IEEE Software, 11(1):21–28, January 1994.
Susan Gerhart, Dan Craigen and Ted Ralston. Regulatory Case Studies. IEEE Software, 11(1):30–39, January 1994.J. Anthony Hall. Seven Myths of Formal Methods. IEEE Software, 7(5):11–19, September 1990.
David Harel. On Visual Formalisms. Communications of the ACM, 31(5):514–530, May 1988.
David Harel. Biting the Silver Bullet: Toward a Brighter Future for System Development. IEEE Computer, 25(1):8–20, January 1992.Ian J. Hayes and Cliff B. Jones. Specifications are not (Necessarily) Executable. Software Engineering Journal, 4(6):330–338, 1989.
C.A.R. Hoare. Communicating Sequential Processes. Communications of the ACM, 21(8):666–677, August 1978.
C.A.R. Hoare. An Overview of some Formal Methods for Program Design. IEEE Computer, 20(9):85–91, September 1987.
Leslie Lamport. A Simple Approach to Specifying Concurrent Systems. Communications of the ACM, 32(1):32–45, January 1989.
Nancy G. Leveson. Medical Devices: The Therac-25 Story. In Safeware: System Safety and Computers, Addison-Wesley Publishing Company, Appendix A, pages 515–553, 1995. Based on Nancy G. Leveson and Clark S. Turner. An Investigation of the Therac-25 Accidents. IEEE Computer, 26(7):18–41, July 1993.
Ken Orr, Chris Gane, Edward Yourdon, Peter P. Chen and Larry L. Constantine. Methodology: The Experts Speak. BYTE, 14(4):221–233, April 1989.Jonathan S. Ostroff. Formal Methods for the Specification and Design of Real-Time Safety Critical Systems. Journal of Systems and Software, pp 33–60, April 1992.
Lesley T. Semmens, Robert B. France and Tom W.G. Docker. Integrated Structured Analysis and Formal Specification Techniques. The Computer Journal, 35(6):600–610, 1992.
Jeannette M. Wing. A Specifier's Introduction to Formal Methods. IEEE Computer, 23(9):8–24, September 1990.
High-Integrity System Specification and Design provides practitioners and researchers with convenient access to a range of essential essays — both classic and state-of-the-art — in a single volume. It will provide them with details of specification and design approaches for this type of system, an overview of the development process, and evidence of how various classes of high-integrity system may be approached and developed successfully.
The volume is also available from the IEEE Computer Society Press.
Jonathan P. Bowen and Mike Hinchey (University of Nebraska at Omaha). Springer-Verlag, London, FACIT series, April 1999. ISBN 3-540-76226-4. (xix+701 pages) Co-author of the following reprinted papers:Seven More Myths of Formal Methods, Jonathan P. Bowen and Mike Hinchey, pages 153-165.Ten Commandments of Formal Methods, Jonathan P. Bowen and Mike Hinchey, pages 217-230.Safety-Critical Systems, Formal Methods and Standards, Jonathan P. Bowen and Victoria Stavridou, pages 485-528.
Table of contents
Preface
Parts:
Specification and Design
Structured Methods
Formal Methods
Object-Orientation
Concurrent and Distributed Systems
Real-Time and Safety-Critical Systems
Integrating Methods
Implementation
CASE
Glossary
Bibliography
Index
List of reprints
The following papers are included:
Grady Booch. Object-Oriented Development. IEEE Transactions on Software Engineering, 12(2):211–221, February 1986.Jonathan P. Bowen and Michael G. Hinchey. Ten Commandments of Formal Methods. IEEE Computer, 28(4):56–63, April 1995.
Jonathan P. Bowen and Michael G. Hinchey. Seven More Myths of Formal Methods. IEEE Software, 12(7):34–41, July 1995.
Jonathan P. Bowen and Victoria Stavridou. Formal Methods, Safety-Critical Systems and Standards. Software Engineering Journal, 8(4):189–209, July 1993.
Frederick P. Brooks, Jr. No Silver Bullet: Essence and Accidents of Software Engineering. IEEE Computer, 20(4):10–19, April 1987. First published in H.-J. Kugler (ed.), Information Processing '86, Elsevier Science Publishers B.V. (North-Holland).John R. Cameron. An Overview of JSD. IEEE Transactions on Software Engineering, 12(2):222–240, February 1986.
Eliott J. Chikofsky and B.L. Rubenstein. CASE: Reliability Engineering for Information Systems. IEEE Software, 5(2):11–16, March 1988.
Robert G. Fichman and Chris F. Kemerer. Object-Oriented and Conventional Analysis and Design Methodologies. IEEE Computer, 25(10):22–39, October 1992.
Norbert E. Fuchs. Specifications are (Preferably) Executable. Software Engineering Journal, 7(5):323–334, September 1992.
Susan Gerhart, Dan Craigen and Ted Ralston. Experience with Formal Methods in Critical Systems. IEEE Software, 11(1):21–28, January 1994.
Susan Gerhart, Dan Craigen and Ted Ralston. Regulatory Case Studies. IEEE Software, 11(1):30–39, January 1994.J. Anthony Hall. Seven Myths of Formal Methods. IEEE Software, 7(5):11–19, September 1990.
David Harel. On Visual Formalisms. Communications of the ACM, 31(5):514–530, May 1988.
David Harel. Biting the Silver Bullet: Toward a Brighter Future for System Development. IEEE Computer, 25(1):8–20, January 1992.Ian J. Hayes and Cliff B. Jones. Specifications are not (Necessarily) Executable. Software Engineering Journal, 4(6):330–338, 1989.
C.A.R. Hoare. Communicating Sequential Processes. Communications of the ACM, 21(8):666–677, August 1978.
C.A.R. Hoare. An Overview of some Formal Methods for Program Design. IEEE Computer, 20(9):85–91, September 1987.
Leslie Lamport. A Simple Approach to Specifying Concurrent Systems. Communications of the ACM, 32(1):32–45, January 1989.
Nancy G. Leveson. Medical Devices: The Therac-25 Story. In Safeware: System Safety and Computers, Addison-Wesley Publishing Company, Appendix A, pages 515–553, 1995. Based on Nancy G. Leveson and Clark S. Turner. An Investigation of the Therac-25 Accidents. IEEE Computer, 26(7):18–41, July 1993.
Ken Orr, Chris Gane, Edward Yourdon, Peter P. Chen and Larry L. Constantine. Methodology: The Experts Speak. BYTE, 14(4):221–233, April 1989.Jonathan S. Ostroff. Formal Methods for the Specification and Design of Real-Time Safety Critical Systems. Journal of Systems and Software, pp 33–60, April 1992.
Lesley T. Semmens, Robert B. France and Tom W.G. Docker. Integrated Structured Analysis and Formal Specification Techniques. The Computer Journal, 35(6):600–610, 1992.
Jeannette M. Wing. A Specifier's Introduction to Formal Methods. IEEE Computer, 23(9):8–24, September 1990.
Research Interests: Computer Science, Software Engineering, Formal Methods (Formal Verification), Design, Software Development, and 8 moreFormal methods, Standards & Specifications, Software Quality Engineering, Safety-Critical Systems, Software Quality Assurance, Software Design, Software Quality, and Formal Specification
Interest in formal methods continues to grow; unfortunately myths and misconceptions regarding their benefits and application continue to grow also. Applications of Formal Methods is a collection of articles by internationally renowned... more
Interest in formal methods continues to grow; unfortunately myths and misconceptions regarding their benefits and application continue to grow also. Applications of Formal Methods is a collection of articles by internationally renowned contributors from both academia and industry which will dispel many of these myths. Each of these essays illustrates the application of formal methods to realistic problems, each with an industrial relevance, in various application domains, describing how they can be scaled to large-scale problems, and providing an evaluation of methods, tools, and validation and verification techniques. Key features include: Foreword by C.A.R. Hoare; Describes real-life examples of the application of formal methods, including descriptions of the methods used, and fragments of specifications which can be used in coursework; Provides statistical evidence of the benefits of formal methods; Discusses techniques for scaling formal methods for use at an industrial scale, and means of overcoming technology transfer problems; Emphasizes tool support and the use of validation and verification techniques. Applications of Formal Methods is essential reading for all students of formal methods and system development, as well as project managers considering the introduction of formal methods, and researchers in the field wishing to know more about industrial application and wishing to learn from the experiences of others.
Research Interests:
As the complexity of embedded computer-controlled systems increases, the present industrial practice for their development gives cause for concern, especially for safety-critical applications where human lives are at stake. The use of... more
As the complexity of embedded computer-controlled systems increases, the present industrial practice for their development gives cause for concern, especially for safety-critical applications where human lives are at stake. The use of software in such systems has increased enormously in the last decade. Formal methods, based on rm mathematical foundations, provide one means to help with reducing the risk of introducing errors during
specication and development. There is currently much interest in both academic and industrial circles concerning the issues involved, but the techniques still need further investigation and promulgation to make their widespread use a reality.
This book presents some results of research into techniques to aid the formal verication of mixed hardware/software systems. Aspects of system specication and verication from requirements down to the underlying hardware are addressed, with particular regard to real-time issues. The work presented is largely based around the Occam programming language and Transputer microprocessor paradigm. The HOL theorem prover, based on higher order logic, has mainly been used in the application of machine-checked proofs.
The book describes research work undertaken on the collaborative UK DTI/SERC funded Information Engineering Directorate SAFEMOS project. The partners were Inmos
Ltd, Cambridge SRI, the Oxford University Computing Laboratory and the University of Cambridge Computer Laboratory, who investigated the problems of formally verifying embedded systems. The most important results of the project are presented in the form of a series of interrelated chapters by project members and associated personnel. In addition, overviews of two other ventures with similar objectives are included as appendices.
The material in this book is intended for computing science researchers and advanced industrial practitioners interested in the application of formal methods to real-time safety-critical systems at all levels of abstraction from requirements to hardware. In addition, Chapters 1 and 11 contain material of a more general nature which may be of interest to managers in charge of projects applying formal methods, especially for safety-critical systems, and others who are considering their use.
Book on the SAFEMOS project. Other contributors: Juanito Camilleri, Rachel Cardell-Oliver, Mike Gordon, Roger Hale, Hans Langmaack, C.A.R. Hoare, John Herbert, He Jifeng, Ian Page, Paritosh Pandya, Andrew Pitts, Anders Ravn, David Shepherd, Victoria Stavridou and Bill Young.
specication and development. There is currently much interest in both academic and industrial circles concerning the issues involved, but the techniques still need further investigation and promulgation to make their widespread use a reality.
This book presents some results of research into techniques to aid the formal verication of mixed hardware/software systems. Aspects of system specication and verication from requirements down to the underlying hardware are addressed, with particular regard to real-time issues. The work presented is largely based around the Occam programming language and Transputer microprocessor paradigm. The HOL theorem prover, based on higher order logic, has mainly been used in the application of machine-checked proofs.
The book describes research work undertaken on the collaborative UK DTI/SERC funded Information Engineering Directorate SAFEMOS project. The partners were Inmos
Ltd, Cambridge SRI, the Oxford University Computing Laboratory and the University of Cambridge Computer Laboratory, who investigated the problems of formally verifying embedded systems. The most important results of the project are presented in the form of a series of interrelated chapters by project members and associated personnel. In addition, overviews of two other ventures with similar objectives are included as appendices.
The material in this book is intended for computing science researchers and advanced industrial practitioners interested in the application of formal methods to real-time safety-critical systems at all levels of abstraction from requirements to hardware. In addition, Chapters 1 and 11 contain material of a more general nature which may be of interest to managers in charge of projects applying formal methods, especially for safety-critical systems, and others who are considering their use.
Book on the SAFEMOS project. Other contributors: Juanito Camilleri, Rachel Cardell-Oliver, Mike Gordon, Roger Hale, Hans Langmaack, C.A.R. Hoare, John Herbert, He Jifeng, Ian Page, Paritosh Pandya, Andrew Pitts, Anders Ravn, David Shepherd, Victoria Stavridou and Bill Young.
Research Interests: Computer Science, Software Engineering, Formal Methods (Formal Verification), Systems Engineering, Software Development, and 12 moreVerification (Computer Science), Formal methods, Hardware Description Languages, Hardware/Software Co-Design, Software Quality Engineering, Software Verification and Validation, Software Quality Assurance, Microprocessor, Software Quality, Formal Specification, Occam, and Transputer
Research Interests: Computer Science, Visual Studies, Performing Arts, Digital Humanities, Visualization, and 12 moreDigital Media, Visual Culture, Information Visualization, Arts Education, Digital Culture, Arts, 3D visualisation, Information Visualisation, Visual Arts, Fine Arts, Data Visualization, and Data Visualisation
English | 正體中文 | 简体中文 | 全文筆數/總筆數: 52533/52939 造訪人次: 9564 線上人數: 8. RC Version 4.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team. 搜尋範圍 全部OA 進階搜尋. ...
Research Interests:
Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editors Didier Bert CNRS, Laboratoire LSR-IMAG 681, rue de la Passerelle,... more
Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editors Didier Bert CNRS, Laboratoire LSR-IMAG 681, rue de la Passerelle, BP 72, 38402 ...
Research Interests:
This book constitutes the refereed proceedings of the Second International Conference of B and Z Users, ZB 2002, held in Grenoble, France in January 2002. The 24 papers presented together with three invited contributions were carefully... more
This book constitutes the refereed proceedings of the Second International Conference of B and Z Users, ZB 2002, held in Grenoble, France in January 2002. The 24 papers presented together with three invited contributions were carefully reviewed and selected for inclusion in the book. The book documents the recent advances for the Z formal specification notion and for the B method; the full scope is covered, ranging from foundational and theoretical issues to advanced applications, tools, and case studies.
Research Interests:
This Z User Meeting (ZUM), was the tenth in the series originally started by Ib Sorensen in December 1986 at Oxford, under the auspices of the Oxford University Computing Laboratory. The first five meetings were all held in Oxford,... more
This Z User Meeting (ZUM), was the tenth in the series originally started by Ib Sorensen in December 1986 at Oxford, under the auspices of the Oxford University Computing Laboratory. The first five meetings were all held in Oxford, initially at the Department of External Studies in Rewley House, and the last at one of the colleges, Lady Margaret Hall.
Research Interests:
This book constitutes the refereed proceedings of the 11th International Conference of Z Users, ZUM'98, held in Berlin, Germany, in September 1998. The 28 revised and invited papers presented were carefully reviewed and... more
This book constitutes the refereed proceedings of the 11th International Conference of Z Users, ZUM'98, held in Berlin, Germany, in September 1998. The 28 revised and invited papers presented were carefully reviewed and selected for inclusion in the book; also included is a comprehensive Z bibliography and a summary of the frequently asked questions at two Z Internet sites. The papers are organized in sections on industrial issues, concurrency, tools, Z and HOL, safety-critical and real-time systems, semantic theory, ...
Research Interests:
Research Interests:
Electronic Visualisation and the Arts London 2012 (EVA London 2012) is co-sponsored by the Computer Arts Society and BCS, The Chartered Institute for IT, of which the CAS is a specialist group. Over almost two decades, the EVA conference... more
Electronic Visualisation and the Arts London 2012 (EVA London 2012) is co-sponsored by the Computer Arts Society and BCS, The Chartered Institute for IT, of which the CAS is a specialist group. Over almost two decades, the EVA conference has established itself as one of London’s most innovative and interdisciplinary conferences in the field of digital visualisation. The papers in this volume touch on museum studies, digital performance, augmented reality, simulation, 3D scanning, digital archaeology and many others. The latest research by established scholars, early career researchers and students may be found here.
For more information about EVA 2012 visit www.eva-london.org or search on Twitter for EVAlondonconf.
For more information about EVA 2012 visit www.eva-london.org or search on Twitter for EVAlondonconf.
Research Interests: Cultural Studies, Computer Science, Humanities Computing (Digital Humanities), Information Technology, Media and Cultural Studies, and 68 morePerforming Arts, Web 2.0, Digital Libraries, Digital Humanities, Social Networks, Visualization, Information Management, Web Design, Cultural Heritage, Digital Curation, Virtual Reality (Computer Graphics), Virtual Environments, Social Networking, Interdisciplinarity, Digital Media, Mobile Media, Information & Communication Technology, Experimental Media Arts, The Social Web, Visual Culture, New Media Arts, Digital Archaeology, Information Visualization, Virtual Communities, Arts Education, Mobile Technology, Virtual Community, Web Technologies, Media Arts, Collaborative Virtual Environments, Digital Culture, Culture, Cross-Cultural Studies, Web Studies, Library and Information Science, Culture Studies, Digital Media & Learning, Computer Supported Collaborative Learning (CSCL), Social Media, Interactive and Digital Media, Web Applications, Interactive Arts, Virtual Art & Virtual Reality, Technology And Culture, Literature and Visual Arts, Digital Games, Virtual Archaeology, Film & Digital Video, Arts, Mobile Web 2.0, Digital Arts, Digital Archives, Culture and Communication, Cultural Heritage Management, Arts-sciences interdisciplinarity, Theory and Practice of Visual Arts, Virtual Worlds, Interdisciplinary Studies, Visual Arts, Interdisciplinary research (Social Sciences), Digital Image Processing, Fine Arts, Interdisciplinary Art, Data Visualization, Virtual Reality, Interdisciplinary research, Communication Arts, and Social Media and Collaborative Technologies
Electronic Visualisation and the Arts 2011 (EVA 2011) is co-sponsored by the Computer Arts Society and BCS, the Chartered Institute for IT, of which the CAS is a specialist group. Over almost two decades, the EVA conference has... more
Electronic Visualisation and the Arts 2011 (EVA 2011) is co-sponsored by the Computer Arts Society and BCS, the Chartered Institute for IT, of which the CAS is a specialist group. Over almost two decades, the EVA conference has established itself as one of London’s most innovative and interdisciplinary conferences in the field of digital visualisation. The papers in this volume touch on museum studies, semantic web, immersive environments, simulation, 3D scanning, haptics, digital archaeology and many others. The latest research by established scholars, early career researchers and students may be found here.
Research Interests: Computer Science, Computer Graphics, Human Computer Interaction, Information Technology, Computer Vision, and 42 moreMedia Studies, New Media, Digital Humanities, Visualization, Museum Studies, Simulation (Computer Science), Interdisciplinarity, Digital Media, Experimental Media Arts, Visual Culture, New Media Arts, Digital Archaeology, Information Visualization, Computer Games Technology, Computers in Graphic Design, Media Arts, Digital Culture, Media Art, Interactive Digital Storytelling, Museum Informatics, Social Media, Interactive and Digital Media, Computer Arts, Haptics, Electronic Media, Interactive Media, Interactive Arts, New Media Art & Emerging Practices, 3D Laser scanning (Architecture), Arts, 3D visualisation, Semantic Web, Digital Arts, New Media Art, 3D Modelling (Architecture), HCI, Visual Arts, Interactive Multimedia Applications, Interdisciplinary research (Social Sciences), Interactive Art, 3D Computer Graphics Programming, and Immersive Environments
Electronic Visualisation and the Arts London 2010 (EVA 2010) is co-sponsored by the Computer Arts Society and BCS, The Chartered Institute for IT, of which the Computer Arts Society is a specialist group. Since 1992, the EVA conference... more
Electronic Visualisation and the Arts London 2010 (EVA 2010) is co-sponsored by the Computer Arts Society and BCS, The Chartered Institute for IT, of which the Computer Arts Society is a specialist group. Since 1992, the EVA conference series has established itself as a natural home from which to explore the richly interdisciplinary and constantly evolving world of digital visualisation. Nothing illustrates this more than the great scope, depth and diversity of the papers contained within this year's Proceedings.
The latest research in digital arts and new media are explored, with contributors ranging from established scholars to the new generation of research students who will lead the field tomorrow. Conference papers cover reconstructive archaeology, virtual museology, digital arts concepts and practice, immersive environments, and digital performance and music.
The latest research in digital arts and new media are explored, with contributors ranging from established scholars to the new generation of research students who will lead the field tomorrow. Conference papers cover reconstructive archaeology, virtual museology, digital arts concepts and practice, immersive environments, and digital performance and music.
Research Interests: Computer Science, Computer Graphics, Human Computer Interaction, Information Technology, Computer Vision, and 42 moreMedia Studies, New Media, Digital Humanities, Visualization, Museum Studies, Simulation (Computer Science), Interdisciplinarity, Digital Media, Experimental Media Arts, Visual Culture, New Media Arts, Digital Archaeology, Information Visualization, Computer Games Technology, Computers in Graphic Design, Media Arts, Digital Culture, Media Art, Interactive Digital Storytelling, Museum Informatics, Social Media, Interactive and Digital Media, Computer Arts, Haptics, Electronic Media, Interactive Media, Interactive Arts, New Media Art & Emerging Practices, 3D Laser scanning (Architecture), Arts, 3D visualisation, Semantic Web, Digital Arts, New Media Art, 3D Modelling (Architecture), HCI, Visual Arts, Interactive Multimedia Applications, Interdisciplinary research (Social Sciences), Interactive Art, 3D Computer Graphics Programming, and Immersive Environments
Electronic Visualisation and the Arts London 2009 (EVA 2009) is co-sponsored by the Computer Arts Society and the British Computer Society, of which the Computer Arts Society is a specialist group. Since 1992, the EVA conference series... more
Electronic Visualisation and the Arts London 2009 (EVA 2009) is co-sponsored by the Computer Arts Society and the British Computer Society, of which the Computer Arts Society is a specialist group. Since 1992, the EVA conference series has established itself as a natural home from which to explore the richly interdisciplinary and constantly evolving world of digital visualisation. Nothing illustrates this more than the great scope, depth and diversity of the papers contained within this year's Proceedings.
The latest research in digital arts and new media are explored, with contributors ranging from established scholars to the new generation of research students who will lead the field tomorrow. Conference papers cover reconstructive archaeology, virtual museology, digital arts concepts and practice, immersive environments, and digital performance and music.
The latest research in digital arts and new media are explored, with contributors ranging from established scholars to the new generation of research students who will lead the field tomorrow. Conference papers cover reconstructive archaeology, virtual museology, digital arts concepts and practice, immersive environments, and digital performance and music.
Research Interests:
This book constitutes the refereed proceedings of the First International Conference of Abstract State Machines, B and Z, ABZ 2008, held in London, UK, in September 2008. The conference simultaneously incorporated the 15th International... more
This book constitutes the refereed proceedings of the First International Conference of Abstract State Machines, B and Z, ABZ 2008, held in London, UK, in September 2008. The conference simultaneously incorporated the 15th International ASM Workshop, the 17th International Conference of Z Users and the 8th International Conference on the B Method.
The 44 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from numerous submissions. The conference fosters the cross-fertilization of three rigorous methods for the design and analysis of hardware and software systems - both in academia and industry - namely Abstract State Machines, B, and Z. Covering a wide range of research spanning from theoretical and methodological foundations to tool support and practical applications, the contributions are organized in topical sections on abstract state machines, B papers, Z papers, ABZ short papers, and the papers of the Verified Software Repository Network (VSR-net) workshop.
The 44 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from numerous submissions. The conference fosters the cross-fertilization of three rigorous methods for the design and analysis of hardware and software systems - both in academia and industry - namely Abstract State Machines, B, and Z. Covering a wide range of research spanning from theoretical and methodological foundations to tool support and practical applications, the contributions are organized in topical sections on abstract state machines, B papers, Z papers, ABZ short papers, and the papers of the Verified Software Repository Network (VSR-net) workshop.
Research Interests:
This Electronic Workshop in Computing (eWiC) proceedings contains selected papers from the workshop on Formal Methods in Industry, held in London, UK, and organised under the auspices of the BCS Formal Aspects of Computing Science (FACS)... more
This Electronic Workshop in Computing (eWiC) proceedings contains selected papers from the workshop on Formal Methods in Industry, held in London, UK, and organised under the auspices of the BCS Formal Aspects of Computing Science (FACS) Specialist Group. The workshop, organised by Paul Boca, Jonathan Bowen and Peter Gorm Larsen, was inspired by the very successful and well-attended Industry Day event at the FM05 conference. The FACS workshop dovetails well with the subsequent Industry Day at FM08, which Peter Gorm Larsen is also co-chairing.
Research Interests:
In a number of recent presentations – most notably at FME’961 – one of the foremost scientists in the field of formal methods, C.A.R. Hoare, has highlighted the fact that formal methods are not the only technique for producing reliable... more
In a number of recent presentations – most notably at FME’961
– one of the foremost scientists in the field of formal methods, C.A.R. Hoare, has highlighted the fact that formal methods are not the only technique for producing reliable software. This seems to have caused some controversy, not least amongst formal
methods practitioners.
How can one of the founding fathers of formal methods seemingly denounce the field of research after over a quarter of a century of support? This is a question that has been posed recently by some formal methods sceptics. However, Prof. Hoare has not abandoned formal methods. He is reiterating, albeit more radically, his 1987 view that more than one tool and notation will be
required in the practical, industrial development of large-scale complex computer systems; and not all of these tools and notations will be, or even need be, formal in nature.
Formal methods are not a solution, but rather one of a selection of techniques that have proven to be useful in the development of reliable complex systems, and to result in hardware and software systems that can be produced on-time and within a budget, while satisfying the stated requirements.
After almost three decades, the time has come to view formal methods in the context of overall industrial-scale system development, and their relationship to other techniques and methods. We should no longer consider the issue of whether
we are “pro-formal” or “anti-formal”, but rather the degree of formality (if any) that we need to support in system development. This is a goal of ZUM’98, the 11th International Conference of Z Users, held for the first time within continental Europe in the city of Berlin, Germany.
– one of the foremost scientists in the field of formal methods, C.A.R. Hoare, has highlighted the fact that formal methods are not the only technique for producing reliable software. This seems to have caused some controversy, not least amongst formal
methods practitioners.
How can one of the founding fathers of formal methods seemingly denounce the field of research after over a quarter of a century of support? This is a question that has been posed recently by some formal methods sceptics. However, Prof. Hoare has not abandoned formal methods. He is reiterating, albeit more radically, his 1987 view that more than one tool and notation will be
required in the practical, industrial development of large-scale complex computer systems; and not all of these tools and notations will be, or even need be, formal in nature.
Formal methods are not a solution, but rather one of a selection of techniques that have proven to be useful in the development of reliable complex systems, and to result in hardware and software systems that can be produced on-time and within a budget, while satisfying the stated requirements.
After almost three decades, the time has come to view formal methods in the context of overall industrial-scale system development, and their relationship to other techniques and methods. We should no longer consider the issue of whether
we are “pro-formal” or “anti-formal”, but rather the degree of formality (if any) that we need to support in system development. This is a goal of ZUM’98, the 11th International Conference of Z Users, held for the first time within continental Europe in the city of Berlin, Germany.
Research Interests:
This volume contains papers from the Eighth Z User Meeting, to be held at the University of Cambridge from 29 - 30 June 1994. The papers cover a wide range of issues associated with Z and formal methods, with particular reference to... more
This volume contains papers from the Eighth Z User Meeting, to be held at the University of Cambridge from 29 - 30 June 1994. The papers cover a wide range of issues associated with Z and formal methods, with particular reference to practical application. These issues include education, standards, tool support, and interaction with other design paradigms such as consideration of real-time and object-oriented approaches to development. Among the actual topics covered are: the formal specification in Z of Defence Standard 00-56; formal specification of telephone features; specifying and interpreting class hierarchies in Z; and software quality assurance using the SAZ method. Z User Workshop, Cambridge 1994 provides an important overview of current research into industrial applications of Z, and will provide invaluable reading for researchers, postgraduate students and also potential industrial users of Z.
Research Interests:
This report gives an overview of the work performed by the Programming Research Group as part of the European collaborative ESPRIT II REDO project (no. 2487). This work covered the areas of reverse-engineering: redocumentation and... more
This report gives an overview of the work performed by the Programming Research Group as part of the European collaborative ESPRIT II REDO project (no. 2487). This work covered the areas of reverse-engineering: redocumentation and re-engineering; validation: post-hoc verification and generation of correct code from specifications; maintenance: new languages and methods to support maintenance. Research in areas of concurrent programming and decompilation were also performed.
Research Interests: Computer Science, Software Engineering, Formal Methods (Formal Verification), Software Maintenance, Semantics, and 11 moreSoftware Testing, Software Development, Formal methods, Formal Semantics, Reverse Engineering, COBOL Programming, Formal Specification, Z Notation, Decompilation, Reverse Engineering Software, and Software Specification
Formal methods are usually used for computer system specification, production and verification. In this paper, a new direction for the use of formal methods is proposed, namely formalization of the regulatory requirements for software of... more
Formal methods are usually used for computer system specification, production and verification. In this paper, a new direction for the use of formal methods is proposed, namely formalization of the regulatory requirements for software
of safety-critical real-time control systems. Formal regulatory requirements, as opposed to formal specifications for a concrete system, have a generic nature, are applied for a wide range of safety-critical control systems, and are the basis for a
licensing process. The use of formal regulatory requirements could help to eliminate ambiguity or misunderstanding of informal definitions, to allow rigorous assessment of satisfaction with respect to requirements and finally to increase the safety level
of a system.
As a formal method for describing the regulatory requirements, the Z notation is proposed. To demonstrate the proposed approach, requirements for protection against common mode software failures and requirements for protection against unauthorized access are considered. Z schemas for these requirements are presented.
of safety-critical real-time control systems. Formal regulatory requirements, as opposed to formal specifications for a concrete system, have a generic nature, are applied for a wide range of safety-critical control systems, and are the basis for a
licensing process. The use of formal regulatory requirements could help to eliminate ambiguity or misunderstanding of informal definitions, to allow rigorous assessment of satisfaction with respect to requirements and finally to increase the safety level
of a system.
As a formal method for describing the regulatory requirements, the Z notation is proposed. To demonstrate the proposed approach, requirements for protection against common mode software failures and requirements for protection against unauthorized access are considered. Z schemas for these requirements are presented.
Research Interests: Control Systems Engineering, Safety Engineering, Computer Science, Software Engineering, Formal Methods (Formal Verification), and 13 moreRequirements Engineering, Regulatory Compliance, Real Time Computing, Control Engineering, Real-time Systems, Formal Methods (Formal Methods), Formal methods, Safety-Critical Systems, Safety-critical software, Safety, Real Time Embedded Systems, Z Notation, and Safety Critical Systems
This paper describes an approach to formalization of criteria of complex computer systems software testing. A brief review of control-flow criteria is introduced.As a formal language for describing the criteria, the Z notation is selected.... more
This paper describes an approach to formalization of criteria of complex computer systems software testing. A brief review of control-flow criteria is introduced.As a formal language for describing the criteria, the Z notation is selected. Z schemas are presented for definitions of the following criteria: statement coverage, decision coverage, condition coverage, decision/condition coverage, full predicate coverage, modified condition/decision coverage, and multiple condition coverage. This characterization could help in the correct understanding of different types of testing and also the correct application of a desired testing regime.
Research Interests:
Compiler compilers are in widespread use, but decompiler compilers are a more novel concept. This paper presents an approach for the decompilation of object code back to source code using a decompiler generator. An example decompilation... more
Compiler compilers are in widespread use, but decompiler compilers are a more novel concept. This paper presents an approach for the decompilation of object code back to source code using a decompiler generator. An example decompilation is presented. Potential applications include reverse engineering, quality assessment, debugging and safety-critical code validation or verification.
Research Interests: Computer Science, Software Engineering, Formal Methods (Formal Verification), Object Oriented Programming, Compilers, and 11 moreSoftware Development, Formal Methods (Formal Methods), Compiler Construction, Formal methods, C++ Programming, Software, Lazy Evaluation, Compilation, Decompilation, Compiler Design and Construction, and Compiler Design
Research Interests:
Oral History of Sir Antony Hoare.
Interviewed by: Jonathan P. Bowen.
Recorded: September 8, 2006, Cambridge, United Kingdom
CHM Reference number: X3698.2007.
© 2006 Computer History Museum, USA.
Interviewed by: Jonathan P. Bowen.
Recorded: September 8, 2006, Cambridge, United Kingdom
CHM Reference number: X3698.2007.
© 2006 Computer History Museum, USA.
Research Interests: Mathematics, Computer Science, Parallel Computing, Software Engineering, Formal Methods (Formal Verification), and 23 moreProgramming Languages, Concurrent Programming Languages, History Of Computing, Logic, Machine Translation, Oral history, Software Development, In-depth Interviews, Formal methods, Mathematical Logic, Theorem Proving, Microsoft Technologies, Proof and Reasoning, Museums, Oral History and Memory, Communicating Sequential Processes, Oral History and Documentary, Sorting Algorithms, Formal Specification, Z Notation, CSP, University of Oxford, and Sorting
The safety aspects of computer-based systems as increasingly important as the use of software escalates because of its convenience and flexibility. However the complexity of even modestly sized programs is such that the elimination of... more
The safety aspects of computer-based systems as increasingly important as the use of software escalates because of its convenience and flexibility. However the complexity of even modestly sized programs is such that the elimination of errors with a high degree of confidence is extremely difficult. There are a number of approaches to enhancing safety in safety-critical control systems. These are surveyed and compared with particular emphasis on systems with software in the controlling system. A glossary of terms and an extensive bibliography for further reading are included.
Research Interests: Information Systems, Control Systems Engineering, Safety Engineering, Computer Science, Software Engineering, and 11 moreFormal Methods (Formal Verification), Complex Systems Science, Systems Engineering, Embedded Systems, Real-time Systems, Software Development, Formal methods, Safety and reliability and risk management, Safety-Critical Systems, Safety, and Computer Systems
This guide gives some information about Oxford, particularly for visitors to the Programming Research Group. It was originally written for two collaborative ESPRIT projects, so some parts are targeted in a European and research project... more
This guide gives some information about Oxford, particularly for visitors to the Programming Research Group. It was originally written for two collaborative ESPRIT projects, so some parts are targeted in a European and research project context. However it should be of general interest, particularly to overseas visitors who are attempting to unravel the mystique of Oxford (although the authors are still trying to do likewise!).
Research Interests:
Window management systems are now used extensively for user interfaces to computer systems. Part I of this monograph introduces some of the fundamental ideas in window systems using a formal notation. Part II outlines three real systems... more
Window management systems are now used extensively for user interfaces to computer systems. Part I of this monograph introduces some of the fundamental ideas in window systems using a formal notation. Part II outlines three real systems and attempts to capture the essence of each system using the same formal notation and ideas introduced in Part 1. Low-level detail is avoided to keep the length to a, manageable size. In Part I, chapter 1 introduces general concepts useful for specifying pixel maps and window systems. Chapter 2 defines the raster-op function which is fundamental to many graphics operations and chapter 3 introduces a simple example window system. In Part II, chapters 4-6 detail three particular window systems. Chapter 7 remarks on experience gained by formally specifying the three window systems. The formal notation used, Z, is based on set theory, and has been developed at the Programming Research Group in Oxford.
Research Interests: Computer Science, Formal Methods (Formal Verification), Windows, Formal Methods (Formal Methods), User Interface, and 13 moreFormal methods, Formal Specification, User interfaces, Graphic User Interface Design, User Interface Design, Z Notation, x Window System, Window Systems, X Windows, Graphical User Interfaces, Formal methods (Z notation), Computer User Interface Design, and Pixels
The specification language Z is used to define a microprocessor based system in a formal notation. The Motorola 6800 8-bit microprocessor is chosen as an example. Its simplicity allows the entire instruction set to be covered. Memory... more
The specification language Z is used to define a microprocessor based system in a formal notation. The Motorola 6800 8-bit microprocessor is chosen as an example. Its simplicity allows the entire instruction set to be covered. Memory configuration and interrupts are also included. The use of a formal description language allows the possibility of verification of the instruction set. Additionally the use of Z combined with informal text is sufficiently readable for the specification to be used for documentation purposes.
Research Interests: Computer Science, Computer Architecture, Formal Methods (Formal Verification), Computer Engineering, Formal Methods (Formal Methods), and 14 moreFormal methods, Microprocessor, Microprocessors and Microcontrollers, Microprocessor Architecture, Formal Specification, Specification, Microprocessor design, Z Notation, Instruction Set Architecture, Microprocessor Based Design, Formal methods (Z notation), Microprocessors, Computer, Memory, and Formal Specifications
Slides for a talk on museums and the World Wide Web Virtual Library at the EVA London 2020 Conference on Electronic Visualisation and the Arts.
The talk is available on YouTube:
https://www.youtube.com/watch?v=aatNVKHTUaw
The talk is available on YouTube:
https://www.youtube.com/watch?v=aatNVKHTUaw
Research Interests:
"Formal methods aim to apply mathematically-based techniques to the development of computer-based systems, especially at the specification level, but also down to the implementation level. This aids early detection and avoidance of errors... more
"Formal methods aim to apply mathematically-based techniques to the development of computer-based systems, especially at the specification level, but also down to the implementation level. This aids early detection and avoidance of errors through increased understanding. It is also beneficial for more rigorous testing coverage. This talk presents the use of formal methods on a real project. The Z notation has been used to specify a large-scale high integrity system to aid in air traffic control. The system has been implemented directly from the Z specification using SPARK Ada, an annotated subset of the Ada programming language that includes assertions and tool support for proofs. The Z specification has been used to direct the testing of the software through additional test design documents using tables and fragments of Z. In addition, Mathematica has been used as a test oracle for algorithmic aspects of the system. In summary, formal methods can be used successfully in all phases of the lifecycle for a large software project with suitably trained engineers, despite limited tool support.
"
"
Research Interests: Computer Science, Software Engineering, Formal Methods (Formal Verification), Industrial Organization, Computer Science Education, and 22 moreComputer Engineering, Industrial Design, Software Testing, Mathematical Programming, Software Development, Software Architecture, Formal Methods (Formal Methods), Software Engineering education, Industrial Engineering, Formal methods, Mathematical Modeling, Mathematical Modelling, Mathematical Logic, Air Traffic Management, Programming, Software, Air traffic control, Formal Specification, Z Notation, Formal methods (Z notation), Formal Systems, and Lightweight Formal Methods
Scholarly advance depends on the interaction of researchers in a large number of overlapping communities in different disciplines (mathematics, computer science, etc.) and fields within these disciplines (e.g., algebra, formal methods,... more
Scholarly advance depends on the interaction of researchers in a large number of overlapping communities in different disciplines (mathematics, computer science, etc.) and fields within these disciplines (e.g., algebra, formal methods, etc.). Now that academic publications are largely accessible on the Internet, these connections are directly available through a number of resources and visualization tools that are available online. Academic links are typically in the form of co-authors, citations, supervisor/student, etc., forming different types of relations between pairs of researchers. This paper explores these links with some specific examples, including visualization of these relationships and their formalization using the Z notation.
Research Interests: Algebra, Computer Science, Formal Methods (Formal Verification), Visualization, Online Communities, and 19 moreInformation Visualization, Community Engagement & Participation, Community Development, Virtual Communities, Academic Writing, Formal Methods (Formal Methods), Communities of practice, Formal methods, Community, Community Participation, Information Visualisation, Data Visualization, Data Visualisation, Formalization, Knowledge Communities, Z Notation, Visualisation, Formal methods (Z notation), and Community participation and engagement
Online communities have increased in size and importance dramatically over the last decade. The fact that many communities are online means that it is possible to extract information about these communities and the connections between... more
Online communities have increased in size and importance dramatically over the last decade. The fact that many communities are online means that it is possible to extract information about these communities and the connections between their members much more easily using software tools, despite their potentially very large size. The links between members of the community can be presented visually and often this can make patterns in the structure of sub-communities immediately obvious. The links and structures of layered communities can also be formalized to gain a better understanding of their modelling. This paper explores these links with some specific examples, including visualization of these relationships and a formalized model of communities using the Z notation. It also considers the development of such communities within the Community of Practice social science framework. Such approaches may be applicable for communities associated with cybersecurity and could be combined for a better understanding of their development.
Research Interests: Computer Science, Formal Methods (Formal Verification), Community Informatics, Information Security, Visualization, and 27 moreOnline Communities, Information Visualization, Community Engagement & Participation, Community Development, Virtual Communities, Community Organizing, Security, Formal Methods (Formal Methods), Communities of practice, Computer Security, Formal methods, Community, Community Participation, Information Visualisation, Online Communities of Practice, Online, Cybersecurity, Data Visualization, Data Visualisation, Formalization, Cyber Physical Systems, Cyber Security, Knowledge Communities, Z Notation, Visualisation, Formal methods (Z notation), and Community participation and engagement
Computer science is a relative young science that also straddles technology and engineering, but is now taught in the vast majority of universities. The talk will explore overall trends in student numbers and profiles, curriculum content,... more
Computer science is a relative young science that also straddles technology and engineering, but is now taught in the vast majority of universities. The talk will explore overall trends in student numbers and profiles, curriculum content, etc., in the UK and elsewhere. The relationship with school-level education and industry will be covered and some possible solutions to key issues will be proposed.
Research Interests: Engineering, Computer Science, Information Technology, Technology, Educational Technology, and 11 moreComputer Science Education, Computer Engineering, Science Education, Engineering Education, Higher Education, Public Universities, Assessment in Higher Education, Higher Education Management, Higher Education Policy, Education Technology, and University
A Body of Knowledge (BoK) is an ontology for a particular professional domain. A Community of Practice (CoP) is the collection of people developing such knowledge. In the paper we explore these concepts in the context of the formal... more
A Body of Knowledge (BoK) is an ontology for a particular professional domain. A Community of Practice (CoP) is the collection of people developing such knowledge. In the paper we explore these concepts in the context of the formal methods community in general and the Z notation community, as has been supported by the Z User Group, in particular. The existing SWEBOK Software Engineering Body of Knowledge is considered with respect to formal methods and a high-level model for the possible structure of of a BoK is provided using the Z notation.
Research Interests: Sociology, Computer Science, Software Engineering, Formal Methods (Formal Verification), Community Informatics, and 14 moreSociology of Education, Computer Science Education, Knowledge Management, Sociology of Knowledge, Online Communities, Community Engagement & Participation, Community Development, Virtual Communities, Community Organizing, Software Engineering education, Formal methods, Community of Practice, Z Notation, and Community participation and engagement
Research Interests: Applied Mathematics, Logic And Foundations Of Mathematics, Set Theory, Computer Science, Software Engineering, and 22 moreFormal Methods (Formal Verification), Logic, Mathematics Education, Design Theory, Mathematical Programming, Software Development, Formal Methods (Formal Methods), Software Engineering education, Formal methods, Mathematical Modeling, Mathematical Modelling, Mathematical Logic, Formal Semantics, Schema Theory, Software Design, Formal Logic, Formal Specification, Z Notation, Formal methods (Z notation), Information Glossary, Functions, and Glossary
Online material for a Z course based on the book by the author. This includes slides for some chapters and the exercises. Updated in July 1998 with minor corrections and improved formatting.
Research Interests: Set Theory, Computer Science, Software Engineering, Formal Methods (Formal Verification), Logic, and 9 moreComputer Science Education, Computer Engineering, Software Development, Software Engineering education, Formal methods, Mathematical Logic, Software Quality Engineering, Software Quality, and Z Notation
Did Alan Turing OBE FRS (23 June 1912 – 7 June 1954), the celebrated mathematician, codebreaker, and pioneer computer scientist, ever visit Oxford? He is well-known for his connections with the University of Cambridge, Bletchley Park, the... more
Did Alan Turing OBE FRS (23 June 1912 – 7 June 1954), the celebrated mathematician, codebreaker, and pioneer computer scientist, ever visit Oxford? He is well-known for his connections with the University of Cambridge, Bletchley Park, the National Physical Laboratory, and the University of Manchester, but there is no known written archival record of him ever visiting Oxford, despite it being the location of the University of Oxford, traditionally a rival of Cambridge. However, surely he must have done so.
Research Interests: History, Intellectual History, Cultural History, Cultural Studies, History Of Computing, and 15 moreHistory of Mathematics, Cultural Heritage, British History, History of Science, Oral history, Modern British History, Second World War, Social History, World War II, Alan Turing, History of Computer Sciences, Oxford, University of Oxford, Cambridge, and History of Oxford University
A personal archive of material related to formal methods has been deposited at Swansea University by the author in 2018. This paper documents the contents of the archive and includes associated publications. The archival material forms... more
A personal archive of material related to formal methods has been deposited at Swansea University by the author in 2018. This paper documents the contents of the archive and includes associated publications. The archival material forms part of a larger History of Computing Collection founded by Prof. John Tucker at Swansea in 2007 and held at the University. It is hoped that this paper can aid future archivists with placing the material in context.