{"title":"《软件验证专题》序言","authors":"C. Hoare, J. Misra","doi":"10.1145/3477355.3477360","DOIUrl":null,"url":null,"abstract":"The origins of software verification go back to the pioneers of Computing Science, von Neumann and Turing. The idea has been rediscovered several times since then, for example by McCarthy, Naur and Floyd. The ideals of verification have inspired half a century of productive computing research at the foundations of the subject. There are now flourishing research schools in computational logic, computer-aided proof, programming theory, formal semantics, specification and programming languages, programming methodology and software engineering. By the end of the last century, enormous progress had been made in verifi cation theory and in tools to assist in its application. The technology of proof was extended to include constraint solving and model checking, which were rou tinely exploited in the electronics industry to increase confidence in the absence of","PeriodicalId":194610,"journal":{"name":"Theories of Programming","volume":"81 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Preface to Special Issue on Software Verification\",\"authors\":\"C. Hoare, J. Misra\",\"doi\":\"10.1145/3477355.3477360\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The origins of software verification go back to the pioneers of Computing Science, von Neumann and Turing. The idea has been rediscovered several times since then, for example by McCarthy, Naur and Floyd. The ideals of verification have inspired half a century of productive computing research at the foundations of the subject. There are now flourishing research schools in computational logic, computer-aided proof, programming theory, formal semantics, specification and programming languages, programming methodology and software engineering. By the end of the last century, enormous progress had been made in verifi cation theory and in tools to assist in its application. The technology of proof was extended to include constraint solving and model checking, which were rou tinely exploited in the electronics industry to increase confidence in the absence of\",\"PeriodicalId\":194610,\"journal\":{\"name\":\"Theories of Programming\",\"volume\":\"81 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Theories of Programming\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3477355.3477360\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theories of Programming","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3477355.3477360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The origins of software verification go back to the pioneers of Computing Science, von Neumann and Turing. The idea has been rediscovered several times since then, for example by McCarthy, Naur and Floyd. The ideals of verification have inspired half a century of productive computing research at the foundations of the subject. There are now flourishing research schools in computational logic, computer-aided proof, programming theory, formal semantics, specification and programming languages, programming methodology and software engineering. By the end of the last century, enormous progress had been made in verifi cation theory and in tools to assist in its application. The technology of proof was extended to include constraint solving and model checking, which were rou tinely exploited in the electronics industry to increase confidence in the absence of