|
Search the dblp DataBase
Helen Treharne:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Helen Treharne, J. Draper, Steve Schneider
Test Case Preparation Using a Prototype. [Citation Graph (0, 0)][DBLP] B, 1998, pp:293-311 [Conf]
- Wilson Ifill, Steve A. Schneider, Helen Treharne
Augmenting B with Control Annotations. [Citation Graph (0, 0)][DBLP] B, 2007, pp:34-48 [Conf]
- Helen Treharne
Supplementing a UML Development Process with B. [Citation Graph (0, 0)][DBLP] FME, 2002, pp:568-586 [Conf]
- Steve Schneider, Helen Treharne
Verifying Controlled Components. [Citation Graph (0, 0)][DBLP] IFM, 2004, pp:87-107 [Conf]
- Steve A. Schneider, Helen Treharne, Neil Evans
Chunks: Component Verification in CSP||B. [Citation Graph (0, 0)][DBLP] IFM, 2005, pp:89-108 [Conf]
- Helen Treharne, Steve Schneider
Using a Process Algebra to Control B Operations. [Citation Graph (0, 0)][DBLP] IFM, 1999, pp:437-456 [Conf]
- C. Culnane, H. Treharne, Anthony T. S. Ho
A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes. [Citation Graph (0, 0)][DBLP] IWDW, 2006, pp:96-110 [Conf]
- Neil Evans, Helen Treharne, Régine Laleau, Marc Frappier
How to Verify Dynamic Properties of Information Systems. [Citation Graph (0, 0)][DBLP] SEFM, 2004, pp:416-425 [Conf]
- Steve Schneider, Helen Treharne
Communicating B Machines. [Citation Graph (0, 0)][DBLP] ZB, 2002, pp:416-435 [Conf]
- Helen Treharne, Steve Schneider
How to Drive a B Machine. [Citation Graph (0, 0)][DBLP] ZB, 2000, pp:188-208 [Conf]
- Helen Treharne, Steve Schneider, Marchia Bramble
Composing Specifications Using Communication. [Citation Graph (0, 0)][DBLP] ZB, 2003, pp:58-78 [Conf]
- Neil Evans, Helen Treharne
Linking Semantic Models to Support CSP || B Consistency Checking. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:145, n:, pp:201-217 [Journal]
- Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne
Tank Monitoring: A pAMN Case Study. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:183-204 [Journal]
- Steve Schneider, Helen Treharne
CSP theorems for communicating B machines. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 2005, v:17, n:4, pp:390-422 [Journal]
- Steve Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne
Tank monitoring: a pAMN case study. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 2006, v:18, n:3, pp:308-328 [Journal]
- Neil Evans, Helen Treharne
Investigating a file transfer protocol using CSP and B. [Citation Graph (0, 0)][DBLP] Software and System Modeling, 2005, v:4, n:3, pp:258-276 [Journal]
- Steve Schneider, Helen Treharne, Ana Cavalcanti, Jim Woodcock
A Layered Behavioural Model of Platelets. [Citation Graph (0, 0)][DBLP] ICECCS, 2006, pp:98-106 [Conf]
- Damien Karkinsky, Steve A. Schneider, Helen Treharne
Combining Mobility with State. [Citation Graph (0, 0)][DBLP] IFM, 2007, pp:373-392 [Conf]
- Neil Evans, Helen Treharne
Interactive tool support for CSP || B consistency checking. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 2007, v:19, n:3, pp:277-302 [Journal]
Object Modelling in the SystemB Industrial Project. [Citation Graph (, )][DBLP]
A Step towards Merging xUML and CSP || {\| \ }B. [Citation Graph (, )][DBLP]
Automatic Generation of CSP || B Skeletons from xUML Models. [Citation Graph (, )][DBLP]
Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B. [Citation Graph (, )][DBLP]
Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model. [Citation Graph (, )][DBLP]
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. [Citation Graph (, )][DBLP]
Formal Analysis of Two Buyer-Seller Watermarking Protocols. [Citation Graph (, )][DBLP]
A Novel Multi-size Block Benford's Law Scheme for Printer Identification. [Citation Graph (, )][DBLP]
Automatic Generation of Integrated Formal Models Corresponding to UML System Models. [Citation Graph (, )][DBLP]
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. [Citation Graph (, )][DBLP]
Experiments in Translating CSP || B to Handel-C. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|