An Analysis of Bitstate Hashing
Formal Methods in System Design
Exploiting Transition Locality in the Disk Based Mur phi Verifier
FMCAD '02 Proceedings of the 4th International Conference on Formal Methods in Computer-Aided Design
Exploiting Transition Locality in Automatic Verification
CHARME '01 Proceedings of the 11th IFIP WG 10.5 Advanced Research Working Conference on Correct Hardware Design and Verification Methods
Probability, Parallelism and the State Space Exploration Problem
TOOLS '98 Proceedings of the 10th International Conference on Computer Performance Evaluation: Modelling Techniques and Tools
Memory arbiter synthesis and verification for a radar memory interface card
Nordic Journal of Computing
Resource-Aware Verification Using Randomized Exploration of Large State Spaces
SPIN '08 Proceedings of the 15th international workshop on Model Checking Software
Journal of Artificial Intelligence Research
A nearly memory-optimal data structure for sets and mappings
SPIN'03 Proceedings of the 10th international conference on Model checking software
Tackling large state spaces in performance modelling
SFM'07 Proceedings of the 7th international conference on Formal methods for performance evaluation
The ComBack method: extending hash compaction with backtracking
ICATPN'07 Proceedings of the 28th international conference on Applications and theory of Petri nets and other models of concurrency
RWset: attacking path explosion in constraint-based test generation
TACAS'08/ETAPS'08 Proceedings of the Theory and practice of software, 14th international conference on Tools and algorithms for the construction and analysis of systems
Fractal Coherence: Scalably Verifiable Cache Coherence
MICRO '43 Proceedings of the 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture
Depth bounded explicit-state model checking
Proceedings of the 18th international SPIN conference on Model checking software
Exploiting hub states in automatic verification
ATVA'05 Proceedings of the Third international conference on Automated Technology for Verification and Analysis
Manager-client pairing: a framework for implementing coherence hierarchies
Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture
Enhanced probabilistic verification with 3spin and 3murphi
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
A perspective on explicit state space exploration of coloured petri nets: past, present, and future
PETRI NETS'10 Proceedings of the 31st international conference on Applications and Theory of Petri Nets
The sweep-line state space exploration method
Theoretical Computer Science
A universal planning system for hybrid domains
Applied Intelligence
Self-adaptive containers: building resource-efficient applications with low programmer overhead
Proceedings of the 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems
Distributed LTL Model Checking with Hash Compaction
Electronic Notes in Theoretical Computer Science (ENTCS)
FIE on firmware: finding vulnerabilities in embedded systems using symbolic execution
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |