The SCEAS System
Navigation Menu

Conferences in DBLP

(vissas)
2005 (conf/vissas/2005)

  1. Bernard Boigelot
    Number-Set Representations for Infinite-State Verification. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:1-16 [Conf]
  2. Ahmed Bouajjani
    Regular Model Checking for Programs with Dynamic Memory. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:17-22 [Conf]
  3. Liana Bozga, Cristian Ene, Romain Janvier, Yassine Lakhnech, Laurent Mazaré, Michaël Périn
    Automatic Verification of Security Properties Based on Abstractions. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:23-53 [Conf]
  4. Edmund M. Clarke, Himanshu Jain, Nishant Sinha
    Grand Challenge: Model Check Software. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:55-68 [Conf]
  5. Catalin Dima
    A Class of Automata for Computing Reachability Relations in Timed Systems. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:69-89 [Conf]
  6. Michael Fisher, Boris Konev, Alexei Lisitsa
    Practical Infinite-State Verification with Temporal Reasoning. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:91-100 [Conf]
  7. Dan C. Marinescu, Gabriela M. Marinescu
    Quantum States and Quantum Measurements. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:101-126 [Conf]
  8. Doron Peled
    Automatic Test Generation and Monitoring of Infinite States Systems. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:127-142 [Conf]
  9. René Peralta
    Cryptographic Primitives Can Be Fragile. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:143-148 [Conf]
  10. Marko Samer, Helmut Veith
    From Temporal Logic Queries to Vacuity Detection. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:149-167 [Conf]
  11. Anatol Slissenko
    Probability and Time in Measuring Security. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:169-183 [Conf]
  12. Ferucio Laurentiu Tiplea, Constantin Enea, Catalin V. Birjoveanu
    Decidability and Complexity Results for Security Protocols. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:185-211 [Conf]
  13. Tayssir Touili
    Dealing with Communication for Dynamic Multithreaded Recursive Programs. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:213-227 [Conf]
  14. Jeannette M. Wing
    Scenario Graphs Applied to Security (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:229-234 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002