|
Conferences in DBLP
Model Generation for Horn Logic with Stratified Negation. [Citation Graph (, )][DBLP]
Counterexample Guided Spotlight Abstraction Refinement. [Citation Graph (, )][DBLP]
An Experimental Evaluation of Probabilistic Simulation. [Citation Graph (, )][DBLP]
An SMT Approach to Bounded Reachability Analysis of Model Programs. [Citation Graph (, )][DBLP]
Parameterized Tree Systems. [Citation Graph (, )][DBLP]
Adapting Petri Nets Reductions to Promela Specifications. [Citation Graph (, )][DBLP]
Verification of a Hierarchical Generic Mutual Exclusion Algorithm. [Citation Graph (, )][DBLP]
Distributed Semantics and Implementation for Systems with Interaction and Priority. [Citation Graph (, )][DBLP]
Checking Correctness of Transactional Behaviors. [Citation Graph (, )][DBLP]
Specifying and Verifying Web Transactions. [Citation Graph (, )][DBLP]
Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri Nets. [Citation Graph (, )][DBLP]
Program Repair Suggestions from Graphical State-Transition Specifications. [Citation Graph (, )][DBLP]
Verifying Erlang Telecommunication Systems with the Process Algebra µCRL. [Citation Graph (, )][DBLP]
NQSL - Formal Language and Tool Support for Network Quality-of-Service Requirements. [Citation Graph (, )][DBLP]
Timed Mobile Ambients for Network Protocols. [Citation Graph (, )][DBLP]
A Specification Framework for Earth-Friendly Logistics. [Citation Graph (, )][DBLP]
A Hierarchy of Equivalences for Probabilistic Processes. [Citation Graph (, )][DBLP]
Multiset Bisimulations as a Common Framework for Ordinary and Probabilistic Bisimulations. [Citation Graph (, )][DBLP]
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. [Citation Graph (, )][DBLP]
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. [Citation Graph (, )][DBLP]
Protocol Modeling with Model Program Composition. [Citation Graph (, )][DBLP]
|