Access Restriction

Author Mills, Harlan D. ♦ Gerhart, Susan L. ♦ Hehner, Eric C.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Computer programming, programs & data
Abstract A. Joe Turner The role of formal methods for program development and verification in computer science curricula will be discussed. The panel members will address the questions 1) What should be taught? 2) When should it be taught? 3) What are the objectives in teaching this material? 4) What are the problems in teaching this material at this level? The panel members and an outline of their positions is given below. Susan L. Gerhart Certain things are understood to be needed for applying verification technology to actual software. The basic knowledge needed to apply verification methods using current technology to large-scale problems will be discussed, based on actual experience in using the technology in such areas as database systems, operating systems, and communications systems. Eric C. Hehner The Dijkstra/Gries approach to program development is an important and useful component of the computer science curriculum. Good programmers use this approach informally, and instruction in the formal methods can provide the understanding that will improve average programmers. Although the subject matter is currently taught at the senior/graduate level at Toronto, it should be taught earlier, for example during the second year. Teaching the material earlier does require a different approach, however, and good student preparation in logic would be essential for success. Harlan D. Mills Formal methods and a large structured set of principles for program design and verification should be taught early in the computer science curriculum. Instruction in programming can be improved by teaching a large set of small principles, and teaching by apprenticeship. Students learn easier and faster when they are freshmen than later after they have become hackers.
Description Affiliation: Wang Institute (Gerhart, Susan L.) || University of Toronto (Hehner, Eric C.) || IBM Corporation (Mills, Harlan D.) || Moderator, Clemson University (Turner, A. Joe)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Notice
Publisher Date 1978-02-01
Publisher Place New York
Journal ACM SIGCSE Bulletin (SGCS)
Volume Number 15
Issue Number 1

Open content in new tab

   Open content in new tab
Source: ACM Digital Library