-
1
-
-
84948988996
-
The formal design of a 1M-gate ASICs
-
Springer-Verlag
-
Eiriksson, A.T. The formal design of a 1M-gate ASICs. In Formal Methods in Computer-Aided Design, G. Gopalakrishnan and P. Windley, Eds., Lecture Notes in Computer Science, 1522, Springer-Verlag (1998), 49-63.
-
(1998)
Formal Methods in Computer-Aided Design, G. Gopalakrishnan and P. Windley, Eds., Lecture Notes in Computer Science
, vol.1522
, pp. 49-63
-
-
Eiriksson, A.T.1
-
2
-
-
0032048379
-
Systematic software testing using VeriSoft: An analysis of the 4ESS heart-beat monitor
-
Apr.-June
-
Godefroid, P., Hanmer, R.S., and Jagadeesan, L.J. Systematic software testing using VeriSoft: An analysis of the 4ESS heart-beat monitor. Bell Labs Technical Journal 3, 2 (Apr.-June 1998).
-
(1998)
Bell Labs Technical Journal
, vol.3
, Issue.2
-
-
Godefroid, P.1
Hanmer, R.S.2
Jagadeesan, L.J.3
-
3
-
-
0007694967
-
A proof generating system for higher-order logic
-
G. Birtwistle and P.A. Subramanyam, Eds., Kluwer
-
Gordon, M.J.C. A proof generating system for higher-order logic. In G. Birtwistle and P.A. Subramanyam, Eds., VLSI Specification, Verification, and Synthesis. Kluwer, 1987.
-
(1987)
VLSI Specification, Verification, and Synthesis
-
-
Gordon, M.J.C.1
-
4
-
-
84863906471
-
SCR: A toolset for specifying and analyzing software requirements
-
Vancouver
-
Heitmeyer, C., Kirby, J., Labaw, B., and Bharadwaj, R. SCR: A toolset for specifying and analyzing software requirements. In Proceedings of the 10th Annual Conference on Computer-Aided Verification (CAV'98), (Vancouver, 1998).
-
(1998)
Proceedings of the 10th Annual Conference on Computer-Aided Verification (CAV'98)
-
-
Heitmeyer, C.1
Kirby, J.2
Labaw, B.3
Bharadwaj, R.4
-
6
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Nov.
-
Lampson, B., Abadi, M., Burroughs, M. and Wobber, E. Authentication in distributed systems: Theory and practice. ACM Trans. Computer Systems 10, 4 (Nov. 1992), 265-310.
-
(1992)
ACM Trans. Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burroughs, M.3
Wobber, E.4
-
8
-
-
84944878354
-
-
CRC Press, NY
-
Menzies, A.J., von Oorschot, P.C., and Vanstone, S.A. Handbook of Applied Cryptography. CRC Press, NY, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menzies, A.J.1
Von Oorschot, P.C.2
Vanstone, S.A.3
-
9
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
10
-
-
0032165313
-
A practical methodology for the formal verification of RISC processors
-
Tahar, S. and Kumar, R. A practical methodology for the formal verification of RISC processors. Formal Methods in System Design 13, 2 (1998), 159-225.
-
(1998)
Formal Methods in System Design
, vol.13
, Issue.2
, pp. 159-225
-
-
Tahar, S.1
Kumar, R.2
-
11
-
-
33846432831
-
Authentication in the TAOS operating system
-
Digital Equipment Corporation Systems Research Center, Palo Alto, CA Dec
-
Wobber, E., Abadi, M., Burroughs, M., and Lampson, B. Authentication in the TAOS Operating System. Report 117, Digital Equipment Corporation Systems Research Center, Palo Alto, CA (Dec. 1993).
-
(1993)
Report
, vol.117
-
-
Wobber, E.1
Abadi, M.2
Burroughs, M.3
Lampson, B.4
-
12
-
-
0042089118
-
Verifying privacy enhanced mail functions with higher order logic
-
Zhou D. and Chin, S.K. Verifying privacy enhanced mail functions with higher order logic. DIMACS Series in Discrete Mathematics 38 (1998), 11-20.
-
(1998)
DIMACS Series in Discrete Mathematics
, vol.38
, pp. 11-20
-
-
Zhou, D.1
Chin, S.K.2
|