Sciweavers

5255 search results - page 149 / 1051
» Formal Methods for Privacy
Sort
View
106
Voted
IFL
2003
Springer
15 years 8 months ago
Lazy Assertions
Olaf Chitil, Dan McNeill, Colin Runciman
87
Voted
FMCAD
2009
Springer
15 years 8 months ago
Hardware/software co-verification of cryptographic algorithms using Cryptol
Levent Erkök, Magnus Carlsson, Adam Wick
98
Voted
TFM
2009
Springer
128views Formal Methods» more  TFM 2009»
15 years 8 months ago
How to Explain Mistakes
Stefan Hallerstede, Michael Leuschel
114
Voted
MPC
1998
Springer
140views Mathematics» more  MPC 1998»
15 years 7 months ago
A Set-Theoretic Model for Real-Time Specification and Reasoning
Timed-trace formalisms have emerged as a powerful method for specifying and reasoning about concurrent real-time systems. We present a simple variant which builds methodically on s...
Colin J. Fidge, Ian J. Hayes, A. P. Martin, Axel W...
107
Voted
FOCM
2011
80views more  FOCM 2011»
14 years 7 months ago
The Serendipity Family of Finite Elements
Douglas N. Arnold, Gerard Awanou