Sciweavers

16 search results - page 2 / 4
» cav 1998
Sort
View
CAV
1998
Springer
79views Hardware» more  CAV 1998»
13 years 9 months ago
Structural Symmetry and Model Checking
Gurmeet Singh Manku, Ramin Hojati, Robert K. Brayt...
CAV
1998
Springer
75views Hardware» more  CAV 1998»
13 years 9 months ago
MOCHA: Modularity in Model Checking
Rajeev Alur, Thomas A. Henzinger, Freddy Y. C. Man...
CAV
1998
Springer
130views Hardware» more  CAV 1998»
13 years 9 months ago
On Checking Model Checkers
It has become good practice to expect authors of new model checking algorithms to provide not only rigorous evidence of the algorithms correctness, but also evidence of their pract...
Gerard J. Holzmann
CAV
1998
Springer
100views Hardware» more  CAV 1998»
13 years 9 months ago
Mechanising BAN Kerberos by the Inductive Method
The version of Kerberos presented by Burrows et al. [5] is fully mechanised using the Inductive Method. Two models are presented, allowing respectively the leak of any session keys...
Giampaolo Bella, Lawrence C. Paulson
CAV
1998
Springer
147views Hardware» more  CAV 1998»
13 years 9 months ago
Verification of an Implementation of Tomasulo's Algorithm by Compositional Model Checking
An implementation of an out-of-order processing unit based on Tomasulo's algorithm is formally verified using compositional model checking techniques. This demonstrates that f...
Kenneth L. McMillan