|
Search the dblp DataBase
Myla Archer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- James Kirby, Myla Archer, Constance L. Heitmeyer
SCR: A Practical Approach to Building a High Assurance COMSEC System. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:109-118 [Conf]
- Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean
Formal specification and verification of data separation in a separation kernel for an embedded system. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:346-355 [Conf]
- Myla Archer, Elizabeth I. Leonard, Matteo Pradella
Modeling Security-Enhanced Linux Policy Specifications for Analysis. [Citation Graph (0, 0)][DBLP] DISCEX (2), 2003, pp:164-169 [Conf]
- Myla Archer, Constance L. Heitmeyer, Elvinia Riccobene
Using TAME to prove invariants of automata models: Two case studies. [Citation Graph (0, 0)][DBLP] FMSP, 2000, pp:25-36 [Conf]
- James Kirby Jr., Myla Archer, Constance L. Heitmeyer
Applying Formal Methods to an Information Security Device: An Experience Report. [Citation Graph (0, 0)][DBLP] HASE, 1999, pp:81-88 [Conf]
- Myla Archer, Constance L. Heitmeyer
Verifying Hybrid Systems Modeled as Timed Automata: A Case Study. [Citation Graph (0, 0)][DBLP] HART, 1997, pp:171-185 [Conf]
- Deborah A. Frincke, Myla Archer, Karl N. Levitt
CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. [Citation Graph (0, 0)][DBLP] KBSE, 1991, pp:151-160 [Conf]
- Myla Archer
Making PVS do what you want. [Citation Graph (0, 0)][DBLP] MEMOCODE, 2005, pp:67- [Conf]
- Elizabeth I. Leonard, Myla Archer
Extended abstract: organizing automaton specifications to achieve faithful representation. [Citation Graph (0, 0)][DBLP] MEMOCODE, 2005, pp:245-246 [Conf]
- Myla Archer, Elizabeth I. Leonard, Matteo Pradella
Analyzing Security-Enhanced Linux Policy Specifications. [Citation Graph (0, 0)][DBLP] POLICY, 2003, pp:158-0 [Conf]
- Myla Archer, Constance L. Heitmeyer
Mechanical verification of timed automata: a case study. [Citation Graph (0, 0)][DBLP] IEEE Real Time Technology and Applications Symposium, 1996, pp:192-203 [Conf]
- Samuel N. Kamin, Myla Archer
Partial Implementations of Abstract Data Types: A Dissenting view on Errors. [Citation Graph (0, 0)][DBLP] Semantics of Data Types, 1984, pp:317-336 [Conf]
- Myla Archer, George Fink, Lie Yang
Linking Other Theorem Provers to HOL Using PM: Proof Manager. [Citation Graph (0, 0)][DBLP] TPHOLs, 1992, pp:539-548 [Conf]
- Myla Archer, Constance L. Heitmeyer
Human-Style Theorem Proving Using PVS. [Citation Graph (0, 0)][DBLP] TPHOLs, 1997, pp:33-48 [Conf]
- George Fink, Myla Archer, Lie Yang
PM: A Proof Manager for HOL and Other Provers. [Citation Graph (0, 0)][DBLP] TPHOLs, 1991, pp:286-304 [Conf]
- Saraswati Kalvala, Myla Archer, Karl N. Levitt
Implementation and Use of Annotations in HOL. [Citation Graph (0, 0)][DBLP] TPHOLs, 1992, pp:407-426 [Conf]
- William L. Harrison, Myla Archer, Karl N. Levitt
A HOL Mechanisation of the Axiomatic Semantics of a Simple Distributed Programming Language. [Citation Graph (0, 0)][DBLP] TPHOLs, 1992, pp:347-356 [Conf]
- Jing Pan, Karl N. Levitt, Myla Archer, Saraswati Kalvala
Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit. [Citation Graph (0, 0)][DBLP] TPHOLs, 1992, pp:427-447 [Conf]
- Cui Zhang, Robert J. Shaw, Ronald A. Olsson, Karl N. Levitt, Myla Archer, Mark Heckman, Gregory D. Benson
Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL. [Citation Graph (0, 0)][DBLP] HUG, 1993, pp:29-42 [Conf]
- Myla Archer
TAME: Using PVS strategies for special-purpose theorem proving. [Citation Graph (0, 0)][DBLP] Ann. Math. Artif. Intell., 2000, v:29, n:1-4, pp:139-181 [Journal]
- Myla Archer, Constance L. Heitmeyer, Elvinia Riccobene
Proving Invariants of I/O Automata with TAME. [Citation Graph (0, 0)][DBLP] Autom. Softw. Eng., 2002, v:9, n:3, pp:201-232 [Journal]
- Constance L. Heitmeyer, Myla Archer, Ramesh Bharadwaj, Ralph D. Jeffords
Tools for constructing requirements specifications: the SCR Toolset at the age of nine. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:1, pp:- [Journal]
- Sayan Mitra, Myla Archer
PVS Strategies for Proving Abstraction Properties of Automata. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:2, pp:45-65 [Journal]
- Myla Archer, Amy Lo, Ronald A. Olsson
Towards a Transformational Approach to Program Verification. [Citation Graph (0, 0)][DBLP] Softw. Test., Verif. Reliab., 1999, v:9, n:2, pp:85-106 [Journal]
- Constance L. Heitmeyer, James Kirby, Bruce G. Labaw, Myla Archer, Ramesh Bharadwaj
Using Abstraction and Model Checking to Detect Safety Violations in Requirements Specifications. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1998, v:24, n:11, pp:927-948 [Journal]
- Myla Archer, Hongping Lim, Nancy A. Lynch, Sayan Mitra, Shinya Umeno
Specifying and proving properties of timed I/O automata in the TIOA toolkit. [Citation Graph (0, 0)][DBLP] MEMOCODE, 2006, pp:129-138 [Conf]
- Myla Archer, Thierry Boy de la Tour, César Muñoz
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:174, n:11, pp:1-2 [Journal]
- Hongping Lim, Myla Archer
Translation Templates to Support Strategy Development in PVS. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:174, n:11, pp:59-79 [Journal]
A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition. [Citation Graph (, )][DBLP]
RE Theory Meets Software Practice: Lessons from the Software Development Trenches. [Citation Graph (, )][DBLP]
Can We Build an Automatic Program Verifier? Invariant Proofs and Other Challenges. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.306secs
|