7 research outputs found

    Pratiques spirituelles, régimes discursifs et rapports sociaux à l’époque moderne (XVIe-XVIIIe siècles)

    No full text
    Pierre-Antoine Fabre, directeur d’études Le séminaire a poursuivi cette année l’exploration du champ de recherches dont il voudrait contribuer à préciser les contours : celui d’une histoire de la spiritualité moderne. On a cherché à comprendre les raisons de la particulière floraison de pratiques et d’écrits reconnus comme « spirituels » dans l’Europe du XVIIe siècle, en inscrivant leur espace dans un double écart par rapport au discours de la théologie, d’une part, que la philosophie comme m..

    Adaptable translator of B specifications to embedded C programs

    No full text
    Abstract. This paper presents the results of the RNTL BOM project, which aimed to develop an approach to generate efficient code from B formal developments. The target domain is smart card applications, in which memory and code size is an important factor. The results detailed in this paper are a new architecture of the translation process, a way to adapt the B0 language in order to include types of the target language and a set of validated optimizations. An assessment of the proposed approach is given through a case study, relative to the development of a Java Card Virtual Machine environment. Keywords. Code generation, embedded systems, B method, smart cards

    Formal verification of security properties of smart card embedded source code

    No full text
    Abstract. This paper reports on a method to handle the verification of various security properties of imperative source code embedded on smart cards. The idea is to combine two program verification approaches: the functional verification at the source code level and the verification of high level properties on a formal model built from the program and its specification. The method presented uses the Caduceus tool, built on top of the Why tool. Caduceus enables the verification of an annotated C program and provides a validation process that we used to generate a high level formal model of the C source code. This method is illustrated by an example extracted from the verification of a smart card embedded operating system

    Psoriasis vulgaris

    No full text
    corecore