The SCEAS System
Navigation Menu

Conferences in DBLP

World Congress on Formal Methods (FM) (fm)
2006 (conf/fm/2006)

  1. Thomas A. Henzinger, Joseph Sifakis
    The Embedded Systems Design Challenge. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:1-15 [Conf]
  2. Gerhard Schellhorn, Holger Grandy, Dominik Haneberg, Wolfgang Reif
    The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:16-31 [Conf]
  3. Jonathan Schmitt, Alwin Hoffmann, Michael Balser, Wolfgang Reif, Mar Marcos
    Interactive Verification of Medical Guidelines. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:32-47 [Conf]
  4. David Delahaye, Jean-Frédéric Étienne, Véronique Donzeau-Gouge
    Certifying Airport Security Regulations Using the Focal Environment. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:48-63 [Conf]
  5. Shinya Umeno, Nancy A. Lynch
    Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:64-80 [Conf]
  6. Ernie Cohen
    Validating the Microsoft Hypervisor. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:81-81 [Conf]
  7. Kim Guldstrand Larsen, Ulrik Nyman, Andrzej Wasowski
    Interface Input/Output Automata. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:82-97 [Conf]
  8. Greg Brunet, Marsha Chechik, Sebastián Uchitel
    Properties of Behavioural Model Merging. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:98-114 [Conf]
  9. Angela Freitas, Ana Cavalcanti
    Automatic Translation from Circus to Java. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:115-130 [Conf]
  10. Annabelle McIver
    Quantitative Refinement and Model Checking for the Analysis of Probabilistic Systems. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:131-146 [Conf]
  11. Marcel Verhoef, Peter Gorm Larsen, Jozef Hooman
    Modeling and Validating Distributed Embedded Real-Time Systems with VDM++. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:147-162 [Conf]
  12. Jewgenij Botaschanjan, Alexander Gruler, Alexander Harhurin, Leonid Kof, Maria Spichkova, David Trachtenherz
    Towards Modularized Verification of Distributed Time-Triggered Systems. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:163-178 [Conf]
  13. Stefano Bacherini, Alessandro Fantechi, Matteo Tempestini, Niccolò Zingoni
    A Story About Formal Methods Adoption by a Railway Signaling Manufacturer. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:179-189 [Conf]
  14. Yujun Zheng, Jinquan Wang, Kan Wang, Jinyun Xue
    Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:190-204 [Conf]
  15. Tim McComb, Graeme Smith
    Compositional Class Refinement in Object-Z. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:205-220 [Conf]
  16. Neil Evans, Michael Butler
    A Proposal for Records in Event-B. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:221-235 [Conf]
  17. José Nuno Oliveira, César Jesus Rodrigues
    Pointfree Factorization of Operation Refinement. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:236-251 [Conf]
  18. Nuno Amálio, Susan Stepney, Fiona Polack
    A Formal Template Language Enabling Metaproof. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:252-267 [Conf]
  19. Ioannis T. Kassios
    Dynamic Frames: Support for Framing, Dependencies and Sharing Without Restrictions. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:268-283 [Conf]
  20. Alcino Cunha, José Nuno Oliveira, Joost Visser
    Type-Safe Two-Level Data Transformation. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:284-299 [Conf]
  21. Peter Höfner, Ridha Khédri, Bernhard Möller
    Feature Algebra. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:300-315 [Conf]
  22. Raymond T. Boute
    Using Domain-Independent Problems for Introducing Formal Methods. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:316-331 [Conf]
  23. Pamela Zave
    Compositional Binding in Network Domains. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:332-347 [Conf]
  24. Zarrin Langari, Richard J. Trefler
    Formal Modeling of Communication Protocols by Graph Transformation. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:348-363 [Conf]
  25. Marc Aiguier, Karim Berkani, Pascale Le Gall
    Feature Specification and Static Analysis for Interaction Resolution. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:364-379 [Conf]
  26. Mass Soldal Lund, Ketil Stølen
    A Fully General Operational Semantics for UML 2.0 Sequence Diagrams with Potential and Mandatory Choice. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:380-395 [Conf]
  27. Xin Li, H. James Hoover, Piotr Rudnicki
    Towards Automatic Exception Safety Verification. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:396-411 [Conf]
  28. Cyrille Artho, Armin Biere, Shinichi Honiden
    Enforcer - Efficient Failure Injection. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:412-427 [Conf]
  29. Fabrice Bouquet, Frédéric Dadeau, Bruno Legeard
    Automated Boundary Test Generation from JML Specifications. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:428-443 [Conf]
  30. Wojciech Mostowski
    Formal Reasoning About Non-atomic Java Card Methods in Dynamic Logic. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:444-459 [Conf]
  31. Sandrine Blazy, Zaynah Dargaye, Xavier Leroy
    Formal Verification of a C Compiler Front-End. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:460-475 [Conf]
  32. Thuan Quang Huynh, Abhik Roychoudhury
    A Memory Model Sensitive Checker for C#. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:476-491 [Conf]
  33. Fabian Bannwart, Peter Müller
    Changing Programs Correctly: Refactoring with Specifications. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:492-507 [Conf]
  34. Viorel Preoteasa
    Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:508-523 [Conf]
  35. Wendy Johnston, Kirsten Winter, Lionel van den Berg, Paul A. Strooper, Peter Robinson
    Model-Based Variable and Transition Orderings for Efficient Symbolic Model Checking. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:524-540 [Conf]
  36. Alastair F. Donaldson, Alice Miller
    Exact and Approximate Strategies for Symmetry Reduction in Model Checking. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:541-556 [Conf]
  37. Alexandre Genon, Thierry Massart, Cédric Meuter
    Monitoring Distributed Controllers: When an Efficient LTL Algorithm on Sequences Is Needed to Model-Check Traces. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:557-572 [Conf]
  38. Amir Pnueli, Aleksandr Zaks
    PSL Model Checking and Run-Time Verification Via Testers. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:573-586 [Conf]
  39. Werner Stephan
    Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:587-591 [Conf]
  40. David von Oheimb
    Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:592-597 [Conf]
  41. Dusko Pavlovic
    Connector-Based Software Development: Deriving Secure Protocols. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:598-599 [Conf]
  42. Jan Jürjens
    Model-Based Security Engineering for Real. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:600-606 [Conf]
  43. D. Randolph Johnson
    Cost Effective Software Engineering for Security. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:607-611 [Conf]
  44. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Formal Methods and Cryptography. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:612-616 [Conf]
  45. Jim Woodcock
    Verified Software Grand Challenge. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:617-617 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002