|
Conferences in DBLP
(vissas) 2005 (conf/vissas/2005)
- Bernard Boigelot
Number-Set Representations for Infinite-State Verification. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:1-16 [Conf]
- Ahmed Bouajjani
Regular Model Checking for Programs with Dynamic Memory. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:17-22 [Conf]
- Liana Bozga, Cristian Ene, Romain Janvier, Yassine Lakhnech, Laurent Mazaré, Michaël Périn
Automatic Verification of Security Properties Based on Abstractions. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:23-53 [Conf]
- Edmund M. Clarke, Himanshu Jain, Nishant Sinha
Grand Challenge: Model Check Software. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:55-68 [Conf]
- Catalin Dima
A Class of Automata for Computing Reachability Relations in Timed Systems. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:69-89 [Conf]
- Michael Fisher, Boris Konev, Alexei Lisitsa
Practical Infinite-State Verification with Temporal Reasoning. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:91-100 [Conf]
- Dan C. Marinescu, Gabriela M. Marinescu
Quantum States and Quantum Measurements. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:101-126 [Conf]
- Doron Peled
Automatic Test Generation and Monitoring of Infinite States Systems. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:127-142 [Conf]
- René Peralta
Cryptographic Primitives Can Be Fragile. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:143-148 [Conf]
- Marko Samer, Helmut Veith
From Temporal Logic Queries to Vacuity Detection. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:149-167 [Conf]
- Anatol Slissenko
Probability and Time in Measuring Security. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:169-183 [Conf]
- Ferucio Laurentiu Tiplea, Constantin Enea, Catalin V. Birjoveanu
Decidability and Complexity Results for Security Protocols. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:185-211 [Conf]
- Tayssir Touili
Dealing with Communication for Dynamic Multithreaded Recursive Programs. [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:213-227 [Conf]
- Jeannette M. Wing
Scenario Graphs Applied to Security (Extended Abstract). [Citation Graph (0, 0)][DBLP] VISSAS, 2005, pp:229-234 [Conf]
|