-
1
-
-
0029390712
-
Formalizing style to understand descriptions of software architecture
-
Abowd GD, Allen R, Garlan D (1995) Formalizing style to understand descriptions of software architecture. ACM Trans Softw Eng Methodol (TOSEM) 4(4):319-364
-
(1995)
ACM Trans Softw Eng Methodol (TOSEM)
, vol.4
, Issue.4
, pp. 319-364
-
-
Abowd, G.D.1
Allen, R.2
Garlan, D.3
-
2
-
-
0003554160
-
Formal methods for industrial applications: Specifying and programming the steam boiler control
-
of, Springer, Berlin Heidelberg New York
-
Abrial J-R, Börger E, Langmaack H (1986) Formal methods for industrial applications: Specifying and programming the steam boiler control, volume 1165 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York
-
(1986)
Lecture Notes in Computer Science
, vol.1165
-
-
Abrial, J.-R.1
Börger, E.2
Langmaack, H.3
-
4
-
-
0003595275
-
Comparing finite-state verification techniques for concurrent software
-
Technical report, Amherst, MA, USA
-
Avrunin GS, Corbett JC, Dwyer MB, Pasareanu CS, Siegel SF (1999) Comparing finite-state verification techniques for concurrent software. Technical report, Amherst, MA, USA
-
(1999)
-
-
Avrunin, G.S.1
Corbett, J.C.2
Dwyer, M.B.3
Pasareanu, C.S.4
Siegel, S.F.5
-
5
-
-
0028202370
-
A really temporal logic
-
Alur R, Henzinger TA (1994) A really temporal logic. J ACM 41(1):181-203
-
(1994)
J ACM
, vol.41
, Issue.1
, pp. 181-203
-
-
Alur, R.1
Henzinger, T.A.2
-
6
-
-
26444528713
-
DARMA: Using different OSs concurrently based on nano-kernel technology
-
Information Processing Society of Japan, in Japanese
-
Arai T, Sekiguchi T, Satoh M, Inoue T, Nakamura T, Iwao H (1999) DARMA: Using different OSs concurrently based on nano-kernel technology. In: Proceedings of 59th-Annual Convention of information processing society of Japan, vol 1, pages 139-140. Information Processing Society of Japan, 1999 (in Japanese)
-
(1999)
Proceedings of 59th-Annual Convention of information processing society of Japan
, vol.1
, pp. 139-140
-
-
Arai, T.1
Sekiguchi, T.2
Satoh, M.3
Inoue, T.4
Nakamura, T.5
Iwao, H.6
-
7
-
-
4444319319
-
Experimental evaluation of verification and validation tools on martian rover software
-
Brat G, Drusinsky D, Giannakopoulou D, Goldberg A, Havelund K, Lowry M, Pasareanu C, Venet A, Visser W, Washington R (2004) Experimental evaluation of verification and validation tools on martian rover software. Formal Methods Syst Des, 25(2-3):167-198
-
(2004)
Formal Methods Syst Des
, vol.25
, Issue.2-3
, pp. 167-198
-
-
Brat, G.1
Drusinsky, D.2
Giannakopoulou, D.3
Goldberg, A.4
Havelund, K.5
Lowry, M.6
Pasareanu, C.7
Venet, A.8
Visser, W.9
Washington, R.10
-
8
-
-
33947124786
-
-
Basin D, Friedrich S (2000) Combining WS1S and HOL. In Gabbay DM de Rijke M (eds) Frontiers of Combining Systems 2, 7 of Studies in Logic and Computation. Res Stud Press/Wiley, Baldock, Herts, UK, 39-56
-
Basin D, Friedrich S (2000) Combining WS1S and HOL. In Gabbay DM de Rijke M (eds) Frontiers of Combining Systems 2, vol 7 of Studies in Logic and Computation. Res Stud Press/Wiley, Baldock, Herts, UK, 39-56
-
-
-
-
9
-
-
0029346301
-
Seven more myths of formal methods
-
Bowen JP, Hinchey MG, (1995) Seven more myths of formal methods. IEEE Softw, 12(3):34-41
-
(1995)
IEEE Softw
, vol.12
, Issue.3
, pp. 34-41
-
-
Bowen, J.P.1
Hinchey, M.G.2
-
10
-
-
26444517471
-
The Boyer-Moore Prover and Nuprl: An experimental comparison
-
Huet G, Plotkin G, eds, Cambridge University Press, Cambridge, pp
-
Basin D, Kaufmann M, (1990) The Boyer-Moore Prover and Nuprl: an experimental comparison. In: Huet G, Plotkin G, (eds) Logical Frameworks. Cambridge University Press, Cambridge, pp. 90-119
-
(1990)
Logical Frameworks
, pp. 90-119
-
-
Basin, D.1
Kaufmann, M.2
-
11
-
-
26444601502
-
Specifying and verifying hysteresis signature system with HOL-Z
-
Technical Report 471, ETH Zürich. Available at the URL
-
Basin D, Kuruma H, Takaragi K, Wolff B (2004) Specifying and verifying hysteresis signature system with HOL-Z. Technical Report 471, ETH Zürich. Available at the URL http://kisogawa.inf.ethz.ch/WebBIB/publications/papers/ 2005/HSD.pdf.
-
(2004)
-
-
Basin, D.1
Kuruma, H.2
Takaragi, K.3
Wolff, B.4
-
12
-
-
0002457511
-
Integrating decision procedures into heuristic theorem provers: A case study with linear arithmetic
-
Boyer RS, Moore JS (1988) Integrating decision procedures into heuristic theorem provers: a case study with linear arithmetic. Mach Intell(11):83-124
-
(1988)
Mach Intell
, vol.11
, pp. 83-124
-
-
Boyer, R.S.1
Moore, J.S.2
-
15
-
-
16244410402
-
HOL-Z 2.0: A proof environment for Z-specifications
-
Brucker AD, Rittinger F, Wolff B (2003) HOL-Z 2.0: A proof environment for Z-specifications. J Univ Comput Sci 9(2):152-172
-
(2003)
J Univ Comput Sci
, vol.9
, Issue.2
, pp. 152-172
-
-
Brucker, A.D.1
Rittinger, F.2
Wolff, B.3
-
17
-
-
0032121284
-
Model checking large software specifications
-
Chan W, Anderson RJ, Beame P, Burns S, Modugno F, Notkin D, Reese JD (1998) Model checking large software specifications. IEEE Trans Softw Eng 24(7):498-520
-
(1998)
IEEE Trans Softw Eng
, vol.24
, Issue.7
, pp. 498-520
-
-
Chan, W.1
Anderson, R.J.2
Beame, P.3
Burns, S.4
Modugno, F.5
Notkin, D.6
Reese, J.D.7
-
19
-
-
0000706110
-
Evaluating deadlock detection methods for concurrent software
-
Corbett JC (1996) Evaluating deadlock detection methods for concurrent software. IEEE Trans Softw Eng 22(3):161-180
-
(1996)
IEEE Trans Softw Eng
, vol.22
, Issue.3
, pp. 161-180
-
-
Corbett, J.C.1
-
20
-
-
26944496823
-
Proof planning for first-order temporal logic
-
Conference on automated deduction, of, Springer, Berlin Heidelberg New York
-
Castellini C, Smaill A (2005) Proof planning for first-order temporal logic. In: Conference on automated deduction, vol 3632 of Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York 235-249
-
(2005)
Lecture Notes in Computer Science
, vol.3632
, pp. 235-249
-
-
Castellini, C.1
Smaill, A.2
-
23
-
-
84958751994
-
les: Integrated canonizer and solver
-
Fillitre J-C, Owre S,Rue H, Shankar N (2001) les: Integrated canonizer and solver. CAV 2001, number 2102 in Lecture Notes in Computer Science
-
(2001)
Lecture Notes in Computer Science
, vol.CAV 2001
, Issue.2102
-
-
Fillitre, J.-C.1
Owre, S.2
Rue, H.3
Shankar, N.4
-
24
-
-
84958741847
-
Fast LTL to Büchi automata translation
-
Berry G, Comon H, Finkel A (eds) Proceedings of the 13th conference on computer aided verification CAV'01, number, Springer, Berlin Heidelberg New York pp
-
Gastin P, Oddoux D (2001) Fast LTL to Büchi automata translation. In: Berry G, Comon H, Finkel A (eds) Proceedings of the 13th conference on computer aided verification (CAV'01), number 2102 in Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York pp. 53-65.
-
(2001)
Lecture Notes in Computer Science
, vol.2102
, pp. 53-65
-
-
Gastin, P.1
Oddoux, D.2
-
25
-
-
0001550560
-
Formal hardware verification methods: A survey
-
Gupta A (1992) Formal hardware verification methods: A survey. J Formal Methods Syst Des 1:151-238
-
(1992)
J Formal Methods Syst Des
, vol.1
, pp. 151-238
-
-
Gupta, A.1
-
26
-
-
0025489197
-
Seven myths of formal methods
-
Hall A (1990) Seven myths of formal methods. IEEE Softw 7(5):11-19
-
(1990)
IEEE Softw
, vol.7
, Issue.5
, pp. 11-19
-
-
Hall, A.1
-
28
-
-
33947129401
-
-
International Standard ISO/IEC13568:2002. Information technology - Z formal specification notation - syntax, type system and semantics.
-
International Standard ISO/IEC13568:2002. Information technology - Z formal specification notation - syntax, type system and semantics.
-
-
-
-
30
-
-
0031634547
-
Towards a completeness result for model checking of security protocols
-
IEEE Computer Society Press pp
-
Lowe G (1998) Towards a completeness result for model checking of security protocols. In: PCSFW: Proceedings of the 11th computer security foundations workshop, IEEE Computer Society Press pp. 96-105
-
(1998)
PCSFW: Proceedings of the 11th computer security foundations workshop
, pp. 96-105
-
-
Lowe, G.1
-
31
-
-
84957810836
-
-
Müller O, Nipkow T (1995) Combining model checking and deduction for I/O-automata. In Brinksma et al Ed (eds) Tools and algorithms for the construction and analysis of systems, 1st international workshop, TACAS'95, 1019 of Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, pp 1-16
-
Müller O, Nipkow T (1995) Combining model checking and deduction for I/O-automata. In Brinksma et al Ed (eds) Tools and algorithms for the construction and analysis of systems, 1st international workshop, TACAS'95, vol 1019 of Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, pp 1-16
-
-
-
-
32
-
-
0026172359
-
Completing the temporal picture
-
Manna Z, Pnueli A (1991) Completing the temporal picture. Theore Comput Sci J 83(1):97-130
-
(1991)
Theore Comput Sci
, vol.J 83
, Issue.1
, pp. 97-130
-
-
Manna, Z.1
Pnueli, A.2
-
34
-
-
33745472695
-
-
Norrish M (2003) Complete integer decision procedures as derived rules in HOL. In: Proceedings of TPHOLs'03, number 2758 in Lecture Notes in Computer Science, 71-86.
-
Norrish M (2003) Complete integer decision procedures as derived rules in HOL. In: Proceedings of TPHOLs'03, number 2758 in Lecture Notes in Computer Science, 71-86.
-
-
-
-
35
-
-
0348126394
-
Isabelle/HOL - A proof assistant for higher-order logic
-
of, Springer, Berlin Heidelberg New York
-
Nipkow T, Paulson LC, Wenzel M (2002) Isabelle/HOL - A proof assistant for higher-order logic, vol 2283 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York
-
(2002)
Lecture Notes in Computer Science
, vol.2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
36
-
-
84957365826
-
PVS: Combining specification, proof checking, and model checking
-
Alur R, Henzinger TA (eds) Computer-aided verification, CAV '96, Berlin Heidelberg New York, pp
-
Owre S, Rajan S, Rushby JM, Shankar N, Srivas MK (1996) PVS: Combining specification, proof checking, and model checking. In: Alur R, Henzinger TA (eds) Computer-aided verification, CAV '96, number 1102 in Lecture Notes in Computer Science, Berlin Heidelberg New York, pp 411-414
-
(1996)
Lecture Notes in Computer Science
, Issue.1102
, pp. 411-414
-
-
Owre, S.1
Rajan, S.2
Rushby, J.M.3
Shankar, N.4
Srivas, M.K.5
-
37
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson LC (1998) The inductive approach to verifying cryptographic protocols. J Comput Sec, 6:85-128
-
(1998)
J Comput Sec
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
38
-
-
0029737169
-
Combining partial order reductions with on-the-fly model checking
-
Peled D (1996) Combining partial order reductions with on-the-fly model checking. Formal Methods Sys Des 8:39-64
-
(1996)
Formal Methods Sys Des
, vol.8
, pp. 39-64
-
-
Peled, D.1
-
40
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
Roscoe AW, Broadfoot PJ (1999) Proving security protocols with model checkers by data independence techniques. J Comput Sec 7(1):147-190
-
(1999)
J Comput Sec
, vol.7
, Issue.1
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
-
42
-
-
84947910414
-
An integration of model-checking with automated proof checking
-
Wolper ed, Computer-aided verification, CAV '95, of, Springer, Berlin Heidelberg New York, pp
-
Rajan S, Shankar N, Srivas MK (1995) An integration of model-checking with automated proof checking. In: Wolper (ed), Computer-aided verification, CAV '95, vol 939 of Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, pp 84-97
-
(1995)
Lecture Notes in Computer Science
, vol.939
, pp. 84-97
-
-
Rajan, S.1
Shankar, N.2
Srivas, M.K.3
-
43
-
-
33947656534
-
Cryptographically sound theorem proving
-
Venice, Italy IEEE Computer Society pp
-
Sprenger C, Backes M, Basin D, Pfitzmann B, Waidner M (2006) Cryptographically sound theorem proving. In: 19th IEEE computer security foundations workshop, Venice, Italy IEEE Computer Society pp 153-166
-
(2006)
19th IEEE computer security foundations workshop
, pp. 153-166
-
-
Sprenger, C.1
Backes, M.2
Basin, D.3
Pfitzmann, B.4
Waidner, M.5
-
44
-
-
33947127229
-
-
Smith G (1997) Derrick J (1997) Refinement and verification of concurrent systems specified in Object-Z and CSP. In: Proceedings of the international conference of formal engineering methods, IEEE Computer Society Press
-
Smith G (1997) Derrick J (1997) Refinement and verification of concurrent systems specified in Object-Z and CSP. In: Proceedings of the international conference of formal engineering methods, IEEE Computer Society Press
-
-
-
-
46
-
-
27644588866
-
An industrially effective environment for formal hardware verification
-
Seger C-JH, Jones RB, O'Leary JW, Melham T, Aagaard MD, Barrett C, Syme D (2005) An industrially effective environment for formal hardware verification. IEEE Trans Comput Aided Des Integrated Circuits Syst, 24(9):1381-1405
-
(2005)
IEEE Trans Comput Aided Des Integrated Circuits Syst
, vol.24
, Issue.9
, pp. 1381-1405
-
-
Seger, C.-J.H.1
Jones, R.B.2
O'Leary, J.W.3
Melham, T.4
Aagaard, M.D.5
Barrett, C.6
Syme, D.7
-
47
-
-
26444585296
-
Alibi establishment for electronic signatures
-
Susaki S, Matsumoto T (2002) Alibi establishment for electronic signatures. Inf Process Soc Jpn 43(8):2381-2393
-
(2002)
Inf Process Soc Jpn
, vol.43
, Issue.8
, pp. 2381-2393
-
-
Susaki, S.1
Matsumoto, T.2
-
49
-
-
0022704337
-
Automata-theoretic techniques for modal logics of programs
-
Vardi MY Wolper P (1986) Automata-theoretic techniques for modal logics of programs. J Comput Syst Sci 32:183-221
-
(1986)
J Comput Syst Sci
, vol.32
, pp. 183-221
-
-
Vardi, M.Y.1
Wolper, P.2
-
50
-
-
33947129913
-
-
Woodcock J, Davies J (1996) Using Z. Prentice-Hall International, New Jersey
-
Woodcock J, Davies J (1996) Using Z. Prentice-Hall International, New Jersey
-
-
-
-
51
-
-
0031124820
-
A case study in model checking software systems
-
Wing J, Vaziri-Farahani M (1997) A case study in model checking software systems. Sci Comput Program 28:273-299
-
(1997)
Sci Comput Program
, vol.28
, pp. 273-299
-
-
Wing, J.1
Vaziri-Farahani, M.2
|