Treffer 41 - 60 von 197

41

Result Certification of Static Program Analysers with Automated Theorem Provers
Besson, Frédéric ; Cornilleau, Pierre-Emmanuel ; Jensen, Thomas ; et al.
Verified Software: Theories, Tools, Experiments : 5th International Conference, VSTTE 2013, Menlo Park, CA, USA, May 17-19, 2013, Revised Selected Papers. 8164:304-325

E-Book
43

Verified Proof Carrying Code
Nipkow, Tobias (Prof. Ph.D.) ; Hofmann, Martin (Prof. Ph.D.) ; Wildmoser, Martin ; et al.

E-Ressource
44

Configuring Java Pathfinder for concurrent Java programs
Bwogi, Andrew ; Dagdelen, Tuncay ; Bwogi, Andrew ; et al.

E-Ressource
45

Attacks on Java Card 3.0 Combining Fault and Logical Attacks.
Barbu, Guillaume ; Thiebeauld, Hugues ; Guerin, Vincent
Smart Card Research & Advanced Application; 2010, p148-163, 16p

Buch
47

Translating Clojure to ACL2 for Verification
Ralston, Ryan

Software Verification Formal Methods Theorem Proving
Dissertation
48

Language-Based Security.
Goos, Gerhard ; Hartmanis, Juris ; van Leeuwen, Jan ; et al.
Mathematical Foundations of Computer Science 1999. 1999, p284-298. 15p.

Buch
50

Language-Based Security : Invited Lecture
Kozen, Dexter ; Goos, Gerhard, editor ; Hartmanis, Juris, editor ; et al.
Mathematical Foundations of Computer Science 1999 : 24th International Symposium, MFCS’99 Szklarska Poręba, Poland, September 6–10,1999 Proceedings. 1672:284-298

E-Book
51

Verified Bytecode Model Checkers
Basin, David ; Friedrich, Stefan ; Gawkowski, Marek ; et al.
Theorem Proving in Higher Order Logics : 15th International Conference, TPHOLs 2002 Hampton, VA, USA, August 20–23, 2002 Proceedings. 2410:47-66

E-Book
52

Verifiable Control Flow Policies for Java Bytecode
Fontaine, Arnaud ; Hym, Samuel ; Simplot-Ryl, Isabelle ; et al.
Formal Aspects of Security and Trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. 7140:115-130

E-Book
53

When COSTA Met KeY: Verified Cost Bounds
Albert, Elvira ; Genaim, Samir ; Merayo, Alicia ; et al.
The Logic of Software. A Tasting Menu of Formal Methods : Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. 13360:19-37

E-Book
54

Residual Runtime Verification via Reachability Analysis
Soueidi, Chukri ; Falcone, Yliès ; Goos, Gerhard, Founding Editor ; et al.
Verified Software. Theories, Tools and Experiments : 14th International Conference, VSTTE 2022, Trento, Italy, October 17–18, 2022, Revised Selected Papers. 13800:148-166

E-Book
55

JayHorn: A Framework for Verifying Java programs
Kahsai, Temesghen ; Rümmer, Philipp ; Sanchez, Huascar ; et al.
Computer Aided Verification : 28th International Conference, CAV 2016, Toronto, ON, Canada, July 17-23, 2016, Proceedings, Part I. 9779:352-358

E-Book
56

Load Time Security Verification
Gadyatskaya, Olga ; Lostal, Eduardo ; Massacci, Fabio ; et al.
Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings. 7093:250-264

E-Book
57

Instrumentace Java programů, kontrakty pro paralelismus
Smrčka, Aleš ; Křena, Bohuslav ; Žárský, Jan ; et al.

E-Ressource
58

Instrumentace Java programů, kontrakty pro paralelismus
Smrčka, Aleš ; Křena, Bohuslav ; Žárský, Jan ; et al.

E-Ressource
59

Instrumentace Java programů, kontrakty pro paralelismus
Smrčka, Aleš ; Křena, Bohuslav ; Smrčka, Aleš ; et al.

E-Ressource
60

Instrumentace Java programů, kontrakty pro paralelismus
Smrčka, Aleš ; Křena, Bohuslav ; Smrčka, Aleš ; et al.

E-Ressource

Filter