{"title":"Assessing the Success and Impact of Hoare’s Logic","authors":"K. Apt, E. Olderog","doi":"10.1145/3477355.3477359","DOIUrl":"https://doi.org/10.1145/3477355.3477359","url":null,"abstract":"logic, various projects, and semantics.","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128568856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CV","authors":"J. Misra","doi":"10.1145/3477355.3477373","DOIUrl":"https://doi.org/10.1145/3477355.3477373","url":null,"abstract":"data types, 259–260 Abstract interpretation, 97interpretation, 97 Abstraction, 188–189, 291. See also Effective abstractionsion, 188–189, 291. See also Effective abstractions in specification, 256–257 ACM interview, 359–385 ACM Turing Award (1980), 3 emperor’s old clothes, 4–21 ADA language, 19, 367","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Resources","authors":"M. Gray","doi":"10.1145/3477355.3477376","DOIUrl":"https://doi.org/10.1145/3477355.3477376","url":null,"abstract":"CKLA Online Resources include links to sites external to the Core Knowledge Foundation and the coreknowledge.org website. These external sites are owned and operated by third-parties, and the Core Knowledge Foundation is not responsible for any errors or omissions in either the links themselves or the content of the websites. If you experience any difficulties when attempting to access one of the linked resources found here, please contact the Core Knowledge Foundation at ckla@coreknowledge.org. The Iliad, the Odyssey, and Other Greek Stories","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127695423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"List of Tony Hoare’s Publications","authors":"Cliff Jones","doi":"10.1145/3477355.3477375","DOIUrl":"https://doi.org/10.1145/3477355.3477375","url":null,"abstract":"","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":"41 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133002907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Specification","authors":"I. Hayes, S. King","doi":"10.1145/3477355.3477367","DOIUrl":"https://doi.org/10.1145/3477355.3477367","url":null,"abstract":"designs that refined a specification. Those ideas were later formalised by Ib’s colleague Carroll Morgan in his refinement calculus [Morgan 1988].8 A further line of research was sparked as part of the specification of checkpointing within the CICS transaction processing system using Tony’s language CSP [Hoare 1985a]. Checkpoints were needed to allow the system to restart in a valid state when a system failure occurred. The version of CSP at that time did not provide a straightforward approach to specifying checkpoints, but Tony was able to extend CSP to include interrupts [Hoare 1985a, section 5.4], which provided a general mechanism that could be used for specifying checkpoints. 11.10 Conclusions From his early days of research in computing Tony has been motivated to solve real-world problems by using mathematically based theories to give a firm founda tion for reasoning about programs and specifications, and the refinement relation between them. ∙ Tony’s research on reasoning about programs using triples of the form p{c}q [Hoare 1969] formed the basis for specifying operations using preconditions and postconditions, ∙ Tony’s research on defining programming language data types via their alge bra properties [Hoare 1972b] pioneered the use of algebraic specifications of data types, and ∙ Tony’s research on the correctness of data representations pioneered the use of abstract data structures and types [Hoare 1972a]. Approaches to both formal specification of computer systems and refinement of those specifications to code owe much to Tony’s pioneering work in the field. References J.-R. Abrial. 1982. The Specification Language Z: Basic Library. Internal report, Programming Research Group, Oxford University. J.-R. Abrial, S. A. Schuman, and B. Meyer. 1980. Specification language. In R. M. McKeag and A. M. Macnaghten (Eds.), On the Construction of Programs: An Advanced Course. Cambridge University Press, UK, 343–410. R.-J. Back. 1980. Correctness Preserving Program Refinements: Proof Theory and Applications. Tract 131, Mathematisch Centrum, Amsterdam. 8. Similar ideas were previously explored by others [Schwarz 1977, Back 1980, Morris 1987]. 268 Chapter 11 Software Specification M. B. Carpenter and H. K. Hallman. 1985. Quality emphasis at IBM’s Software Engineering Institute. IBM Syst. J. 24, 2, 121–133. DOI: https://doi.org/10.1147/sj.242.0121. B. P. Collins, J. E. Nicholls, and I. H. Sørensen. December 1987. Introducing Formal Methods: The CICS Experience with Z. Technical Report TR12.260, IBM, Hursley Park. R. J. Colvin, I. J. Hayes, and L. A. Meinicke. 2016. Designing a semantic model for a widespectrum language with concurrency. Form. Asp. Comput. 29, 853–875. ISSN 0934-5043. DOI: https://doi.org/10.1007/s00165-017-0416-4. E. W. Dijkstra. 1975. Guarded commands, nondeterminacy, and a formal derivation of pro grams. Commun. ACM 18, 453–458. DOI: https://doi.org/10.1145/360933.360975. E. W. Dijkstra. 1976. A Discipline of Programming. Prentice","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120831073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching at Belfast and Oxford","authors":"B. Sufrin","doi":"10.1145/3477355.3477366","DOIUrl":"https://doi.org/10.1145/3477355.3477366","url":null,"abstract":"Although as a youth he had been known as ‘the Professor’ by his younger siblings, Tony Hoare’s first academic appointment was in 1968, as Professor and Head of the Department of Computer Science at Queen’s University Belfast. His second was in 1977 as Professor of Computation and Head of the Programming Research Group of the Computing Laboratory at the University of Oxford — until 2011 the closest thing that the University had to a Department of Computer Science.","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121489223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doctoral Students","authors":"S. Letvak, Eloise R. Lewis","doi":"10.1145/3477355.3477374","DOIUrl":"https://doi.org/10.1145/3477355.3477374","url":null,"abstract":"2016-2018 Director of Pre-Licensure BSN Program Coordinator of Veterans Access Program 2014-2016 Professor and Department ChairAdult Health Nursing Department Director of Undergraduate Programs 2013-2014 Professor and Department ChairAdult Health Nursing Department 2012-2013 Interim Department ChairAdult Health Nursing Department 2006-2012 Associate Professor (with tenure) 2000-2006 Assistant Professor School of Nursing The University of North Carolina at Greensboro Greensboro, North Carolina","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134601453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Effective Abstractions","authors":"Cliff B. Jones, J. Misra","doi":"10.1145/3477355.3477358","DOIUrl":"https://doi.org/10.1145/3477355.3477358","url":null,"abstract":"","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Verified Software Initiative: A Manifesto","authors":"C. Hoare, J. Misra, Gary T. Leavens, N. Shankar","doi":"10.1145/3477355.3477361","DOIUrl":"https://doi.org/10.1145/3477355.3477361","url":null,"abstract":"5.","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121641649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}