The SCEAS System
Navigation Menu

Conferences in DBLP

Formal Techniques for Networked and Distributed Systems / (forte)
2008 (conf/forte/2008)


  1. Model Generation for Horn Logic with Stratified Negation. [Citation Graph (, )][DBLP]


  2. Counterexample Guided Spotlight Abstraction Refinement. [Citation Graph (, )][DBLP]


  3. An Experimental Evaluation of Probabilistic Simulation. [Citation Graph (, )][DBLP]


  4. An SMT Approach to Bounded Reachability Analysis of Model Programs. [Citation Graph (, )][DBLP]


  5. Parameterized Tree Systems. [Citation Graph (, )][DBLP]


  6. Adapting Petri Nets Reductions to Promela Specifications. [Citation Graph (, )][DBLP]


  7. Verification of a Hierarchical Generic Mutual Exclusion Algorithm. [Citation Graph (, )][DBLP]


  8. Distributed Semantics and Implementation for Systems with Interaction and Priority. [Citation Graph (, )][DBLP]


  9. Checking Correctness of Transactional Behaviors. [Citation Graph (, )][DBLP]


  10. Specifying and Verifying Web Transactions. [Citation Graph (, )][DBLP]


  11. Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri Nets. [Citation Graph (, )][DBLP]


  12. Program Repair Suggestions from Graphical State-Transition Specifications. [Citation Graph (, )][DBLP]


  13. Verifying Erlang Telecommunication Systems with the Process Algebra µCRL. [Citation Graph (, )][DBLP]


  14. NQSL - Formal Language and Tool Support for Network Quality-of-Service Requirements. [Citation Graph (, )][DBLP]


  15. Timed Mobile Ambients for Network Protocols. [Citation Graph (, )][DBLP]


  16. A Specification Framework for Earth-Friendly Logistics. [Citation Graph (, )][DBLP]


  17. A Hierarchy of Equivalences for Probabilistic Processes. [Citation Graph (, )][DBLP]


  18. Multiset Bisimulations as a Common Framework for Ordinary and Probabilistic Bisimulations. [Citation Graph (, )][DBLP]


  19. Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. [Citation Graph (, )][DBLP]


  20. Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. [Citation Graph (, )][DBLP]


  21. Protocol Modeling with Model Program Composition. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002