-
1
-
-
84947438108
-
Partial-order reduction in symbolic state space exploration
-
Rajeev Alur, Robert K. Brayton, Thomas A. Henzinger, Shaz Qadeer, and SriramK. Rajamani. Partial-order reduction in symbolic state space exploration. In Computer Aided Verification, pages 340–351, 1997. 549
-
(1997)
In Computer Aided Verification
, vol.549
, pp. 340-351
-
-
Alur, R.1
Brayton, R.K.2
Henzinger, T.A.3
Qadeer, S.4
Rajamani, S.5
-
2
-
-
84863933189
-
On-the-fly Analysis of Systems with Unbounded, Lossy Fifo Channels
-
P. Abdulla, A. Bouajjani, and B. Jonsson. On-the-fly Analysis of Systems with Unbounded, Lossy Fifo Channels. In CAV’98. LNCS 1427, 1998. 553
-
(1998)
In CAV’98. LNCS
, vol.1427
, pp. 553
-
-
Abdulla, P.1
Bouajjani, A.2
Jonsson, B.3
-
3
-
-
84957059164
-
Handling global conditions in parametrized system verification
-
540, 542, 553
-
P. A. Abdulla, A. Bouajjani, B. Jonsson, and M. Nilsson. Handling global conditions in parametrized system verification. Lecture Notes in Computer Science, 1633:134–150, 1999. 540, 542, 553
-
(1999)
Lecture Notes in Computer Science
, vol.1633
, pp. 134-150
-
-
Abdulla, P.A.1
Bouajjani, A.2
Jonsson, B.3
Nilsson, M.4
-
5
-
-
0013372365
-
Regular model checking
-
A. Bouajjani, B. Jonsson, M. Nilsson, and T. Touili. Regular model checking. In CAV’00. LNCS, 2000. 539, 540, 542, 545
-
(2000)
In CAV’00. LNCS
-
-
Bouajjani, A.1
Jonsson, B.2
Nilsson, M.3
Touili, T.4
-
6
-
-
67649451135
-
Permutation Rewriting and Algorithmic Verification. In LICS’01
-
A. Bouajjani, A. Muscholl, and T. Touili. Permutation Rewriting and Algorithmic Verification. In LICS’01. IEEE, 2001. 539, 553
-
(2001)
IEEE
, vol.539
, pp. 553
-
-
Bouajjani, A.1
Muscholl, A.2
Touili, T.3
-
7
-
-
33845680224
-
Languages, Rewriting systems, and Verification of Infinte-State Systems
-
invited paper. 539
-
A. Bouajjani. Languages, Rewriting systems, and Verification of Infinte-State Systems. In ICALP’01. LNCS 2076, 2001. invited paper. 539
-
(2001)
In ICALP’01. LNCS 2076
-
-
Bouajjani, A.1
-
8
-
-
84937594241
-
-
Technical report, LIAFA, May 200 , 549, 550
-
A. Bouajjani and T. Touili. Extrapolating tree transformations. Technical report, LIAFA, May 2002. http://verif.liafa.jussieu.fr/~touili. 542, 549, 550
-
(2002)
Extrapolating Tree Transformations
, pp. 542
-
-
Bouajjani, A.1
Touili, T.2
-
10
-
-
35248897454
-
Tree automata with one memory, set constraints and ping-pong protocols
-
H. Comon, V. Cortier, and J. Mitchell. Tree automata with one memory, set constraints and ping-pong protocols. In ICALP’2001. LNCS 2076, 2001. 553
-
(2001)
In ICALP’2001. LNCS 2076
, pp. 553
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.3
-
11
-
-
0004060205
-
-
Available on
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree automata techniques and applications. Available on:http://www.grappa.univ-lille3.fr/tata, 1997. 544
-
(1997)
Tree Automata Techniques and Applications
, pp. 544
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Lugiez, D.5
Tison, S.6
Tommasi, M.7
-
12
-
-
84947707419
-
Verifying parameterised networks using abstraction and regular languages
-
549
-
E. M. Clarke, O. Grumberg, and S. Jha. Verifying parameterised networks using abstraction and regular languages. Lecture Notes in Computer Science, 962:395–407, 1995. 549
-
(1995)
Lecture Notes in Computer Science
, vol.962
, pp. 395-407
-
-
Clarke, E.M.1
Grumberg, O.2
Jha, S.3
-
13
-
-
0002575820
-
Automatic discovery of linear restraints among variables of a program
-
Patrick Cousot and Nicholas Halbwachs. Automatic discovery of linear restraints among variables of a program. In POPL’78. ACM, 1978. 542
-
(1978)
In POPL’78. ACM
, pp. 542
-
-
Cousot, P.1
Halbwachs, N.2
-
15
-
-
33745656232
-
An automata-theoretic approach to interpro-cedural data-flow analysis
-
J. Esparza and J. Knoop. An automata-theoretic approach to interpro-cedural data-flow analysis. In FOSSACS’99, volume LNCS 1578, 1999. 541
-
(1999)
In FOSSACS’99, Volume LNCS
, vol.1578
, pp. 541
-
-
Esparza, J.1
Knoop, J.2
-
16
-
-
0000988941
-
Bottom-up and top-down tree transformations – a comparison
-
Joost Engelfriet. Bottom-up and top-down tree transformations – a comparison. In Mathematical Systems Theory, volume 9(3), 1975. 544
-
(1975)
In Mathematical Systems Theory
, vol.9
, Issue.3
, pp. 544
-
-
Engelfriet, J.1
-
17
-
-
0033698872
-
Efficient algorithms for pre * and post * on interprocedural parallel flow graphs
-
542, 551
-
Javier Esparza and Andreas Podelski. Efficient algorithms for pre * and post * on interprocedural parallel flow graphs. In Symposium on Principles of Programming Languages, pages 1–11, 2000. 542, 551
-
(2000)
In Symposium on Principles of Programming Languages
, pp. 1-11
-
-
Esparza, J.1
Podelski, A.2
-
18
-
-
0003941815
-
Reachability sets of parametrized rings as regular languages
-
n Infinity’97, Elsevier Science
-
L. Fribourg and H. Olsen. Reachability sets of parametrized rings as regular languages. In Infinity’97. volume 9 of Electronical Notes in Theoretical Computer Science. Elsevier Science, 1997. 547
-
(1997)
Electronical Notes in Theoretical Computer Science
, vol.9
, pp. 547
-
-
Fribourg, L.1
Olsen, H.2
-
20
-
-
84974751548
-
Regular tree languages and rewrite systems
-
542, 552
-
R. Gilleron and S. Tison. Regular tree languages and rewrite systems. In Fundamenta Informaticae, volume 24, pages 157–175, 1995. 542, 552
-
(1995)
In Fundamenta Informaticae
, vol.24
, pp. 157-175
-
-
Gilleron, R.1
Tison, S.2
-
21
-
-
0000541261
-
Transitive closures of regular relations for verifying infinite-state systems
-
B. Jonsson and M. Nilsson. Transitive closures of regular relations for verifying infinite-state systems. In TACAS’ 00. LNCS, 2000. 540, 542
-
(2000)
In TACAS’ 00. LNCS
, vol.540
, pp. 542
-
-
Jonsson, B.1
Nilsson, M.2
-
22
-
-
84947424451
-
Symbolic model checking with rich assertional languages
-
In O. Grumberg, editor
-
Y. Kesten, O. Maler, M. Marcus, A. Pnueli, and E. Shahar. Symbolic model checking with rich assertional languages. In O. Grumberg, editor, Proc. CAV’97, volume 1254 of LNCS, pages 424–435. Springer, 1997. 539, 542, 547
-
(1997)
Proc. CAV’97, Volume 1254 of LNCS
, vol.539
, Issue.542
, pp. 424-435
-
-
Kesten, Y.1
Maler, O.2
Marcus, M.3
Pnueli, A.4
Shahar, E.5
-
23
-
-
84945955894
-
The regular viewpoint on PA-processes
-
Nice, France, Sep
-
D. Lugiez and Ph. Schnoebelen. The regular viewpoint on PA-processes. In Proc. 9th Int. Conf. Concurrency Theory (CONCUR’98), Nice, France, Sep. 1998, volume 1466, pages 50–66. Springer, 1998. 542, 551
-
(1998)
In Proc. 9Th Int. Conf. Concurrency Theory (CONCUR’98)
, vol.1466
, pp. 50-66
-
-
Lugiez, D.1
Schnoebelen, P.H.2
-
25
-
-
84858747028
-
Abstracting cryptographic protocols with tree automata
-
D. Monniaux. Abstracting cryptographic protocols with tree automata. Science of Computer Programming, 2002. 553
-
(2002)
Science of Computer Programming
, pp. 553
-
-
Monniaux, D.1
-
26
-
-
33845635553
-
Liveness and acceleration in parametrized verification. In CAV’00
-
A. Pnueli and E. Shahar. Liveness and acceleration in parametrized verification. In CAV’00. LNCS, 2000. 540, 542
-
(2000)
LNCS
, vol.540
, pp. 542
-
-
Pnueli, A.1
Shahar, E.2
-
28
-
-
84858751796
-
Verifying systems with infinite but regular stae spaces
-
Pierre Wolper and Bernard Boigelot. Verifying systems with infinite but regular stae spaces. In CAV’98. LNCS 1254, 1998. 539
-
(1998)
In CAV’98. LNCS 1254
, pp. 539
-
-
Wolper, P.1
Boigelot, B.2
|