Semantic theories of programs with nested interrupts
Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integ...
Ausführliche Beschreibung
Autor*in: |
Huang, Yanhong [verfasserIn] He, Jifeng [verfasserIn] Zhu, Huibiao [verfasserIn] Zhao, Yongxin [verfasserIn] Shi, Jianqi [verfasserIn] Qin, Shengchao [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Frontiers of computer science in China - Beijing : Higher Education Press, 2007, 9(2015), 3 vom: 03. Feb., Seite 331-345 |
---|---|
Übergeordnetes Werk: |
volume:9 ; year:2015 ; number:3 ; day:03 ; month:02 ; pages:331-345 |
Links: |
---|
DOI / URN: |
10.1007/s11704-015-3251-x |
---|
Katalog-ID: |
SPR021938334 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | SPR021938334 | ||
003 | DE-627 | ||
005 | 20220111090308.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201006s2015 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s11704-015-3251-x |2 doi | |
035 | |a (DE-627)SPR021938334 | ||
035 | |a (SPR)s11704-015-3251-x-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q ASE |
084 | |a 54.00 |2 bkl | ||
100 | 1 | |a Huang, Yanhong |e verfasserin |4 aut | |
245 | 1 | 0 | |a Semantic theories of programs with nested interrupts |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics. | ||
650 | 4 | |a embedded and real-time operating systems |7 (dpeaa)DE-He213 | |
650 | 4 | |a interrupts |7 (dpeaa)DE-He213 | |
650 | 4 | |a operational semantics |7 (dpeaa)DE-He213 | |
650 | 4 | |a denotational semantics |7 (dpeaa)DE-He213 | |
650 | 4 | |a semantics linking |7 (dpeaa)DE-He213 | |
700 | 1 | |a He, Jifeng |e verfasserin |4 aut | |
700 | 1 | |a Zhu, Huibiao |e verfasserin |4 aut | |
700 | 1 | |a Zhao, Yongxin |e verfasserin |4 aut | |
700 | 1 | |a Shi, Jianqi |e verfasserin |4 aut | |
700 | 1 | |a Qin, Shengchao |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Frontiers of computer science in China |d Beijing : Higher Education Press, 2007 |g 9(2015), 3 vom: 03. Feb., Seite 331-345 |w (DE-627)545787726 |w (DE-600)2388878-7 |x 1673-7466 |7 nnns |
773 | 1 | 8 | |g volume:9 |g year:2015 |g number:3 |g day:03 |g month:02 |g pages:331-345 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s11704-015-3251-x |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_32 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_101 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_120 | ||
912 | |a GBV_ILN_138 | ||
912 | |a GBV_ILN_152 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_171 | ||
912 | |a GBV_ILN_187 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_250 | ||
912 | |a GBV_ILN_281 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2005 | ||
936 | b | k | |a 54.00 |q ASE |
951 | |a AR | ||
952 | |d 9 |j 2015 |e 3 |b 03 |c 02 |h 331-345 |
author_variant |
y h yh j h jh h z hz y z yz j s js s q sq |
---|---|
matchkey_str |
article:16737466:2015----::eatchoisfrgasihe |
hierarchy_sort_str |
2015 |
bklnumber |
54.00 |
publishDate |
2015 |
allfields |
10.1007/s11704-015-3251-x doi (DE-627)SPR021938334 (SPR)s11704-015-3251-x-e DE-627 ger DE-627 rakwb eng 004 ASE 54.00 bkl Huang, Yanhong verfasserin aut Semantic theories of programs with nested interrupts 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics. embedded and real-time operating systems (dpeaa)DE-He213 interrupts (dpeaa)DE-He213 operational semantics (dpeaa)DE-He213 denotational semantics (dpeaa)DE-He213 semantics linking (dpeaa)DE-He213 He, Jifeng verfasserin aut Zhu, Huibiao verfasserin aut Zhao, Yongxin verfasserin aut Shi, Jianqi verfasserin aut Qin, Shengchao verfasserin aut Enthalten in Frontiers of computer science in China Beijing : Higher Education Press, 2007 9(2015), 3 vom: 03. Feb., Seite 331-345 (DE-627)545787726 (DE-600)2388878-7 1673-7466 nnns volume:9 year:2015 number:3 day:03 month:02 pages:331-345 https://dx.doi.org/10.1007/s11704-015-3251-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_152 GBV_ILN_161 GBV_ILN_171 GBV_ILN_187 GBV_ILN_224 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2005 54.00 ASE AR 9 2015 3 03 02 331-345 |
spelling |
10.1007/s11704-015-3251-x doi (DE-627)SPR021938334 (SPR)s11704-015-3251-x-e DE-627 ger DE-627 rakwb eng 004 ASE 54.00 bkl Huang, Yanhong verfasserin aut Semantic theories of programs with nested interrupts 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics. embedded and real-time operating systems (dpeaa)DE-He213 interrupts (dpeaa)DE-He213 operational semantics (dpeaa)DE-He213 denotational semantics (dpeaa)DE-He213 semantics linking (dpeaa)DE-He213 He, Jifeng verfasserin aut Zhu, Huibiao verfasserin aut Zhao, Yongxin verfasserin aut Shi, Jianqi verfasserin aut Qin, Shengchao verfasserin aut Enthalten in Frontiers of computer science in China Beijing : Higher Education Press, 2007 9(2015), 3 vom: 03. Feb., Seite 331-345 (DE-627)545787726 (DE-600)2388878-7 1673-7466 nnns volume:9 year:2015 number:3 day:03 month:02 pages:331-345 https://dx.doi.org/10.1007/s11704-015-3251-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_152 GBV_ILN_161 GBV_ILN_171 GBV_ILN_187 GBV_ILN_224 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2005 54.00 ASE AR 9 2015 3 03 02 331-345 |
allfields_unstemmed |
10.1007/s11704-015-3251-x doi (DE-627)SPR021938334 (SPR)s11704-015-3251-x-e DE-627 ger DE-627 rakwb eng 004 ASE 54.00 bkl Huang, Yanhong verfasserin aut Semantic theories of programs with nested interrupts 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics. embedded and real-time operating systems (dpeaa)DE-He213 interrupts (dpeaa)DE-He213 operational semantics (dpeaa)DE-He213 denotational semantics (dpeaa)DE-He213 semantics linking (dpeaa)DE-He213 He, Jifeng verfasserin aut Zhu, Huibiao verfasserin aut Zhao, Yongxin verfasserin aut Shi, Jianqi verfasserin aut Qin, Shengchao verfasserin aut Enthalten in Frontiers of computer science in China Beijing : Higher Education Press, 2007 9(2015), 3 vom: 03. Feb., Seite 331-345 (DE-627)545787726 (DE-600)2388878-7 1673-7466 nnns volume:9 year:2015 number:3 day:03 month:02 pages:331-345 https://dx.doi.org/10.1007/s11704-015-3251-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_152 GBV_ILN_161 GBV_ILN_171 GBV_ILN_187 GBV_ILN_224 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2005 54.00 ASE AR 9 2015 3 03 02 331-345 |
allfieldsGer |
10.1007/s11704-015-3251-x doi (DE-627)SPR021938334 (SPR)s11704-015-3251-x-e DE-627 ger DE-627 rakwb eng 004 ASE 54.00 bkl Huang, Yanhong verfasserin aut Semantic theories of programs with nested interrupts 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics. embedded and real-time operating systems (dpeaa)DE-He213 interrupts (dpeaa)DE-He213 operational semantics (dpeaa)DE-He213 denotational semantics (dpeaa)DE-He213 semantics linking (dpeaa)DE-He213 He, Jifeng verfasserin aut Zhu, Huibiao verfasserin aut Zhao, Yongxin verfasserin aut Shi, Jianqi verfasserin aut Qin, Shengchao verfasserin aut Enthalten in Frontiers of computer science in China Beijing : Higher Education Press, 2007 9(2015), 3 vom: 03. Feb., Seite 331-345 (DE-627)545787726 (DE-600)2388878-7 1673-7466 nnns volume:9 year:2015 number:3 day:03 month:02 pages:331-345 https://dx.doi.org/10.1007/s11704-015-3251-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_152 GBV_ILN_161 GBV_ILN_171 GBV_ILN_187 GBV_ILN_224 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2005 54.00 ASE AR 9 2015 3 03 02 331-345 |
allfieldsSound |
10.1007/s11704-015-3251-x doi (DE-627)SPR021938334 (SPR)s11704-015-3251-x-e DE-627 ger DE-627 rakwb eng 004 ASE 54.00 bkl Huang, Yanhong verfasserin aut Semantic theories of programs with nested interrupts 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics. embedded and real-time operating systems (dpeaa)DE-He213 interrupts (dpeaa)DE-He213 operational semantics (dpeaa)DE-He213 denotational semantics (dpeaa)DE-He213 semantics linking (dpeaa)DE-He213 He, Jifeng verfasserin aut Zhu, Huibiao verfasserin aut Zhao, Yongxin verfasserin aut Shi, Jianqi verfasserin aut Qin, Shengchao verfasserin aut Enthalten in Frontiers of computer science in China Beijing : Higher Education Press, 2007 9(2015), 3 vom: 03. Feb., Seite 331-345 (DE-627)545787726 (DE-600)2388878-7 1673-7466 nnns volume:9 year:2015 number:3 day:03 month:02 pages:331-345 https://dx.doi.org/10.1007/s11704-015-3251-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_152 GBV_ILN_161 GBV_ILN_171 GBV_ILN_187 GBV_ILN_224 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2005 54.00 ASE AR 9 2015 3 03 02 331-345 |
language |
English |
source |
Enthalten in Frontiers of computer science in China 9(2015), 3 vom: 03. Feb., Seite 331-345 volume:9 year:2015 number:3 day:03 month:02 pages:331-345 |
sourceStr |
Enthalten in Frontiers of computer science in China 9(2015), 3 vom: 03. Feb., Seite 331-345 volume:9 year:2015 number:3 day:03 month:02 pages:331-345 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
embedded and real-time operating systems interrupts operational semantics denotational semantics semantics linking |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Frontiers of computer science in China |
authorswithroles_txt_mv |
Huang, Yanhong @@aut@@ He, Jifeng @@aut@@ Zhu, Huibiao @@aut@@ Zhao, Yongxin @@aut@@ Shi, Jianqi @@aut@@ Qin, Shengchao @@aut@@ |
publishDateDaySort_date |
2015-02-03T00:00:00Z |
hierarchy_top_id |
545787726 |
dewey-sort |
14 |
id |
SPR021938334 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR021938334</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220111090308.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201006s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11704-015-3251-x</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR021938334</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s11704-015-3251-x-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">ASE</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Huang, Yanhong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Semantic theories of programs with nested interrupts</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">embedded and real-time operating systems</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">interrupts</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operational semantics</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">denotational semantics</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">semantics linking</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">He, Jifeng</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Huibiao</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhao, Yongxin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shi, Jianqi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qin, Shengchao</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Frontiers of computer science in China</subfield><subfield code="d">Beijing : Higher Education Press, 2007</subfield><subfield code="g">9(2015), 3 vom: 03. Feb., Seite 331-345</subfield><subfield code="w">(DE-627)545787726</subfield><subfield code="w">(DE-600)2388878-7</subfield><subfield code="x">1673-7466</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:9</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:3</subfield><subfield code="g">day:03</subfield><subfield code="g">month:02</subfield><subfield code="g">pages:331-345</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s11704-015-3251-x</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">ASE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">9</subfield><subfield code="j">2015</subfield><subfield code="e">3</subfield><subfield code="b">03</subfield><subfield code="c">02</subfield><subfield code="h">331-345</subfield></datafield></record></collection>
|
author |
Huang, Yanhong |
spellingShingle |
Huang, Yanhong ddc 004 bkl 54.00 misc embedded and real-time operating systems misc interrupts misc operational semantics misc denotational semantics misc semantics linking Semantic theories of programs with nested interrupts |
authorStr |
Huang, Yanhong |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)545787726 |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
1673-7466 |
topic_title |
004 ASE 54.00 bkl Semantic theories of programs with nested interrupts embedded and real-time operating systems (dpeaa)DE-He213 interrupts (dpeaa)DE-He213 operational semantics (dpeaa)DE-He213 denotational semantics (dpeaa)DE-He213 semantics linking (dpeaa)DE-He213 |
topic |
ddc 004 bkl 54.00 misc embedded and real-time operating systems misc interrupts misc operational semantics misc denotational semantics misc semantics linking |
topic_unstemmed |
ddc 004 bkl 54.00 misc embedded and real-time operating systems misc interrupts misc operational semantics misc denotational semantics misc semantics linking |
topic_browse |
ddc 004 bkl 54.00 misc embedded and real-time operating systems misc interrupts misc operational semantics misc denotational semantics misc semantics linking |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Frontiers of computer science in China |
hierarchy_parent_id |
545787726 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Frontiers of computer science in China |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)545787726 (DE-600)2388878-7 |
title |
Semantic theories of programs with nested interrupts |
ctrlnum |
(DE-627)SPR021938334 (SPR)s11704-015-3251-x-e |
title_full |
Semantic theories of programs with nested interrupts |
author_sort |
Huang, Yanhong |
journal |
Frontiers of computer science in China |
journalStr |
Frontiers of computer science in China |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
331 |
author_browse |
Huang, Yanhong He, Jifeng Zhu, Huibiao Zhao, Yongxin Shi, Jianqi Qin, Shengchao |
container_volume |
9 |
class |
004 ASE 54.00 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Huang, Yanhong |
doi_str_mv |
10.1007/s11704-015-3251-x |
dewey-full |
004 |
author2-role |
verfasserin |
title_sort |
semantic theories of programs with nested interrupts |
title_auth |
Semantic theories of programs with nested interrupts |
abstract |
Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics. |
abstractGer |
Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics. |
abstract_unstemmed |
Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_152 GBV_ILN_161 GBV_ILN_171 GBV_ILN_187 GBV_ILN_224 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2005 |
container_issue |
3 |
title_short |
Semantic theories of programs with nested interrupts |
url |
https://dx.doi.org/10.1007/s11704-015-3251-x |
remote_bool |
true |
author2 |
He, Jifeng Zhu, Huibiao Zhao, Yongxin Shi, Jianqi Qin, Shengchao |
author2Str |
He, Jifeng Zhu, Huibiao Zhao, Yongxin Shi, Jianqi Qin, Shengchao |
ppnlink |
545787726 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11704-015-3251-x |
up_date |
2024-07-04T01:06:18.010Z |
_version_ |
1803608578339110912 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR021938334</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220111090308.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201006s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11704-015-3251-x</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR021938334</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s11704-015-3251-x-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">ASE</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Huang, Yanhong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Semantic theories of programs with nested interrupts</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract In the design of dependable software for embedded and real-time operating systems, time analysis is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the randomness and nondeterminism of interrupt handling behaviors. Thus research into a theory that integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we present a programming language to describe programs with interrupts that is comprised of two essential parts: main program and interrupt handling programs.We also explore a timed operational semantics and a denotational semantics to specify the meanings of our language. Furthermore, a strategy of deriving denotational semantics from the timed operational semantics is provided to demonstrate the soundness of our operational semantics by showing the consistency between the derived denotational semantics and the original denotational semantics.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">embedded and real-time operating systems</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">interrupts</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operational semantics</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">denotational semantics</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">semantics linking</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">He, Jifeng</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Huibiao</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhao, Yongxin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shi, Jianqi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qin, Shengchao</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Frontiers of computer science in China</subfield><subfield code="d">Beijing : Higher Education Press, 2007</subfield><subfield code="g">9(2015), 3 vom: 03. Feb., Seite 331-345</subfield><subfield code="w">(DE-627)545787726</subfield><subfield code="w">(DE-600)2388878-7</subfield><subfield code="x">1673-7466</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:9</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:3</subfield><subfield code="g">day:03</subfield><subfield code="g">month:02</subfield><subfield code="g">pages:331-345</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s11704-015-3251-x</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">ASE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">9</subfield><subfield code="j">2015</subfield><subfield code="e">3</subfield><subfield code="b">03</subfield><subfield code="c">02</subfield><subfield code="h">331-345</subfield></datafield></record></collection>
|
score |
7.402135 |