-
1
-
-
33847702424
-
Bounded model checking
-
A. Biere, A.Cimatti, E. M. Clarke, O. Strichman, and Y. Zhu, "Bounded model checking", Advances in Computers, 58, 2003.
-
(2003)
Advances in Computers
, vol.58
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.M.3
Strichman, O.4
Zhu, Y.5
-
3
-
-
32344436131
-
-
http://www.cert.org/stats/cert_stats.html.
-
-
-
-
4
-
-
35248898859
-
Data access specification and the most powerful symbolic attacker in msr
-
LNCS 2609, Springer-Verlag, November
-
I. Cervesato, "Data access specification and the most powerful symbolic attacker in msr", In ISSS 2002: Software Security Theories and Systems, LNCS 2609, Springer-Verlag, November 2003, 384-416.
-
(2003)
ISSS 2002: Software Security Theories and Systems
, pp. 384-416
-
-
Cervesato, I.1
-
5
-
-
84936855973
-
Events in property patterns
-
LNCS 1680, Springer-Verlag
-
M. Chechik and D. O. Paun, "Events in property patterns", In Theoretical and Practical Aspects of SPIN Model Checking, LNCS 1680, Springer-Verlag, 1999, 154-167.
-
(1999)
Theoretical and Practical Aspects of SPIN Model Checking
, pp. 154-167
-
-
Chechik, M.1
Paun, D.O.2
-
8
-
-
4544229064
-
Monotonicity and persistence in preferential logics
-
J. Engelfriet, "Monotonicity and persistence in preferential logics", J. Artif. Intell. Res. 8, 1998, 1-21.
-
(1998)
J. Artif. Intell. Res.
, vol.8
, pp. 1-21
-
-
Engelfriet, J.1
-
10
-
-
0040241328
-
Towards a theory of knowledge and ignorance: Preliminary report
-
Springer-Verlag
-
J. Halpern and Y. Moses, "Towards a Theory of Knowledge and Ignorance: Preliminary Report", In Logics and Models of Concurrent Systems, Springer-Verlag, 1985, 459-476.
-
(1985)
Logics and Models of Concurrent Systems
, pp. 459-476
-
-
Halpern, J.1
Moses, Y.2
-
14
-
-
4544259747
-
A complete and decidable logic for resource bounded agents
-
New York, July
-
M. Jago, N. Alechina, and B. Logan, "A complete and decidable logic for resource bounded agents", Proc. AAMAS 04, New York, July 2004, 606-613.
-
(2004)
Proc. AAMAS 04
, pp. 606-613
-
-
Jago, M.1
Alechina, N.2
Logan, B.3
-
17
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C. Meadows, and J. Millen, "Three systems for cryptographic protocol analysis", Journal of Cryptology 7(2), 1994, 79-130.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
19
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
October
-
A. van Lamsweerde and E. Letter, "Handling obstacles in goal-oriented requirements engineering", IEEE Transactions on Software Engineering, Special Issue on Exception Handling, 26(10), October 2000, 978-1005.
-
(2000)
IEEE Transactions on Software Engineering, Special Issue on Exception Handling
, vol.26
, Issue.10
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letter, E.2
-
21
-
-
35248827688
-
From system goals to software architecture
-
M. Bernardo & P. Inverardi (eds), LNCS 2804, Springer-Verlag
-
A. van Lamsweerde, "From System Goals to Software Architecture", In Formal Methods for Software Architectures, M. Bernardo & P. Inverardi (eds), LNCS 2804, Springer-Verlag, 2003, 25-43.
-
(2003)
Formal Methods for Software Architectures
, pp. 25-43
-
-
Van Lamsweerde, A.1
-
28
-
-
0012646053
-
-
Lecture Notes in Artificial Intelligence. Springer-Verlag, Berlin
-
Ch. Schulte. Programming Constraint Services. Lecture Notes in Artificial Intelligence Vol. 2302,. Springer-Verlag, Berlin, 2002.
-
(2002)
Programming Constraint Services
, vol.2302
-
-
Schulte, Ch.1
|