A compiler for conditional term rewriting systems
on Rewriting techniques and applications
Evolving algebras 1993: Lipari guide
Specification and validation methods
An Industrial Strength Theorem Prover for a Logic Based on Common Lisp
IEEE Transactions on Software Engineering
Term Indexing
Axiomatising the Logic of Computer Programming
Axiomatising the Logic of Computer Programming
The KIV-Approach to Software Verification
KORSO - Methods, Languages, and Tools for the Construction of Correct Software
Three Selected Case Studies in Verification
KORSO - Methods, Languages, and Tools for the Construction of Correct Software
A Dynamic Logic for Program Verification
Proceedings of the Symposium on Logical Foundations of Computer Science: Logic at Botik '89
A Calculus for Access Control in Distributed Systems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Verification of Large Software Systems
Proceedings of the 12th Conference on Foundations of Software Technology and Theoretical Computer Science
Reuse of Proofs in Software Verification
Proceedings of the 13th Conference on Foundations of Software Technology and Theoretical Computer Science
Demonstration of the Interactive Graph-Visualization System da Vinci
GD '94 Proceedings of the DIMACS International Workshop on Graph Drawing
PVS: A Prototype Verification System
CADE-11 Proceedings of the 11th International Conference on Automated Deduction: Automated Deduction
Towards an Evolutionary Formal Software Development
Proceedings of the 16th IEEE international conference on Automated software engineering
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code
FM '08 Proceedings of the 15th international symposium on Formal Methods
Bounded relational analysis of free data types
TAP'08 Proceedings of the 2nd international conference on Tests and proofs
A formal framework for compositional verification of organic computing systems
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Ensuring correct self-reconfiguration in safety-critical applications by verified result checking
Proceedings of the 2011 workshop on Organic computing
Medical protocol diagnosis using formal methods
FHIES'11 Proceedings of the First international conference on Foundations of Health Informatics Engineering and Systems
Modeling test cases for security protocols with SecureMDD
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |