Symbolic

Results: 1438



#Item
421

Automatic Verification of Cryptographic Protocols in the Symbolic Model Automatic Verifier ProVerif

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2013-09-02 11:47:42
    422

    Symbolic Bisimulation for the Applied Pi Calculus ∗ St´ephanie Delaune1

    Add to Reading List

    Source URL: www.lsv.ens-cachan.fr

    Language: English - Date: 2008-12-17 08:07:55
      423

      Unidentifiable Slavic Object: ‘Eastern’ Robotics & the Western Imagination This text will explore some of the symbolic meanings and associations surrounding the Robovox project. It will suggest that Robovox is a sta

      Add to Reading List

      Source URL: www.robovox.co.uk

      Language: English
        424

        A simple approach towards recapturing consistent theories in paraconsistent settings Jc Beall entailments.net Final Draft Forthcoming in Review of Symbolic Logic. Not final draft!!

        Add to Reading List

        Source URL: homepages.uconn.edu

        Language: English - Date: 2013-06-10 17:48:54
          425

          F IE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution Drew Davidson Benjamin Moench Somesh Jha Thomas Ristenpart

          Add to Reading List

          Source URL: rist.tech.cornell.edu

          Language: English - Date: 2015-07-13 21:30:13
            426Association for Computing Machinery / Computer algebra systems / Computer algebra / Computer science / SIGSAM / International Symposium on Symbolic and Algebraic Computation / Symbolic computation / Communications of the ACM / ALTRAN / Symbolic Manipulation Program

            join today! SIGSAM & ACM www.sigsam.org www.acm.org

            Add to Reading List

            Source URL: www.sigsam.org

            Language: English - Date: 2015-06-11 09:17:36
            427

            RWset: Attacking Path Explosion in Constraint-Based Test Generation Peter Boonstoppel, Cristian Cadar, Dawson Engler Computer Systems Laboratory, Stanford University Abstract. Recent work has used variations of symbolic

            Add to Reading List

            Source URL: www.doc.ic.ac.uk

            Language: English - Date: 2016-03-03 12:25:42
              428

              Automatically Generating Malicious Disks using Symbolic Execution Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar and Dawson Engler Stanford University Computer Systems Laboratory {junfeng,csar,twohey,cristic,engler}@

              Add to Reading List

              Source URL: www.doc.ic.ac.uk

              Language: English - Date: 2016-03-03 12:25:42
                429

                SYNASC17th International Symposium on Symbolic and Numeric Algorithms for Scientific ComputingSeptember 2015, Timișoara, România

                Add to Reading List

                Source URL: synasc.ro

                Language: English - Date: 2015-04-25 14:51:38
                  430

                  On Intergenerational Time Obviously it’s symbolic, it works on both levels. I don’t want to tell you too much, I don’t want to spoil the film... uh, but, I’ll just say: ICARUS. Okay? If you know what I mean, gre

                  Add to Reading List

                  Source URL: www.noattainment.com

                  Language: English - Date: 2013-08-21 03:40:20
                    UPDATE