Sciweavers

FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 7 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
FM
2006
Springer
135views Formal Methods» more  FM 2006»
15 years 7 months ago
A Story About Formal Methods Adoption by a Railway Signaling Manufacturer
Stefano Bacherini, Alessandro Fantechi, Matteo Tem...
144
Voted
FM
2006
Springer
161views Formal Methods» more  FM 2006»
15 years 7 months ago
Changing Programs Correctly: Refactoring with Specifications
Refactorings change the internal structure of code without changing its external behavior. For non-trivial refactorings, the preservation of external behavior depends on semantic p...
Fabian Bannwart, Peter Müller
FM
2006
Springer
126views Formal Methods» more  FM 2006»
15 years 7 months ago
Towards Modularized Verification of Distributed Time-Triggered Systems
Abstract. The correctness of a system according to a given specification is essential, especially for safety-critical applications. One such typical application domain is the autom...
Jewgenij Botaschanjan, Alexander Gruler, Alexander...
FM
2006
Springer
133views Formal Methods» more  FM 2006»
15 years 7 months ago
Enforcer - Efficient Failure Injection
Non-determinism of the thread schedule is a well-known problem in concurrent programming. However, other sources of non-determinism exist which cannot be controlled by an applicati...
Cyrille Artho, Armin Biere, Shinichi Honiden