Formal methods

Results: 2204



#Item
341Formal methods / Logic in computer science / Models of computation / Programming language semantics / Abstraction / Kernel / Abstract state machines / Semantics / Denotational semantics / Operational semantics / Refinement / Limit

Compositional Verification of a Baby Virtual Memory Manager Alexander Vaynberg and Zhong Shao Yale University Abstract. A virtual memory manager (VMM) is a part of an operating system

Add to Reading List

Source URL: flint.cs.yale.edu

Language: English - Date: 2012-10-02 09:49:19
342

A version of this technical report has been accepted for publication at 15th International Conference on Formal Engineering Methods (ICFEMVerification of Static and Dynamic Barrier Synchronization Using Bounded P

Add to Reading List

Source URL: loris-7.ddns.comp.nus.edu.sg

Language: English - Date: 2013-08-26 23:07:21
    343

    FASE System Description System: The Integrating Object-Oriented Design and Formal Methods?

    Add to Reading List

    Source URL: heim.ifi.uio.no

    Language: English - Date: 2007-09-18 03:47:53
      344

      IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 6, NO. 2, MAYGuest Editorial Special Section on Formal Methods in Manufacturing

      Add to Reading List

      Source URL: tii.ieee-ies.org

      Language: English - Date: 2015-09-23 23:12:20
        345Software engineering / Computing / Software testing / Software / Concurrent programming languages / Electronic design automation / Formal methods / NP-complete problems / Fuzz testing / Random testing / Satisfiability modulo theories / Symbolic execution

        Automated Software Testing for the 21st Century Patrice Godefroid Microsoft Research TCE’2015

        Add to Reading List

        Source URL: tce.technion.ac.il

        Language: English - Date: 2015-06-18 08:12:13
        346Theoretical computer science / Logic in computer science / Formal methods / Mathematical logic / KeY / Formal verification / Dynamic logic / Automated theorem proving / Logic / Language-based security

        A Theorem Proving Approach to Secure Information Flow in Concurrent Programs (Extended Abstract) Daniel Bruns, Karlsruhe Institute of Technology We present an approach to formally prove secure information flow in multi-t

        Add to Reading List

        Source URL: software.imdea.org

        Language: English - Date: 2015-07-09 06:40:16
        347

        Methods for Estimating End of Life Electronics Exports from North America T. Reed Miller, Jeremy Gregory, and Randolph Kirchain. MIT Materials Systems Laboratory Formal Remanufacturing and Recycling

        Add to Reading List

        Source URL: msl.mit.edu

        Language: English - Date: 2011-05-15 14:46:24
          348

          Manifesto: Experiments and formal methods for privacy research

          Add to Reading List

          Source URL: scone.cs.st-andrews.ac.uk

          Language: English - Date: 2010-09-10 11:05:13
            349

            Form Methods Syst Des:178–210 DOIs10703A formal hierarchy of weak memory models Jade Alglave

            Add to Reading List

            Source URL: www0.cs.ucl.ac.uk

            Language: English - Date: 2012-09-10 07:41:01
              350

              Damien Zufferey Research Interests Programming Languages, Formal Methods, Program Analysis and Verification, and Distributed Systems. Education

              Add to Reading List

              Source URL: pub.ist.ac.at

              Language: English - Date: 2013-11-29 18:20:22
                UPDATE