


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 50 matches
- 2003
- Jean-Raymond Abrial:
Event Based Sequential Program Development: Application to Constructing a Pointer Program. FME 2003: 51-74 - Alessandro Aldini
, Marco Bernardo:
A General Approach to Deadlock Freedom Verification for Software Architectures. FME 2003: 658-677 - Alessandro Armando, Luca Compagna, Pierre Ganty:
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis. FME 2003: 875-893 - Diyaa-Addein Atiya, Steve King, Jim Woodcock
:
A Circus Semantics for Ravenscar Protected Objects. FME 2003: 617-635 - Maurice H. ter Beek, Jetty Kleijn:
Team Automata Satisfying Compositionality. FME 2003: 381-400 - Didier Bert, Sylvain Boulmé, Marie-Laure Potet, Antoine Requet, Laurent Voisin:
Adaptable Translator of B Specifications to Embedded C Programs. FME 2003: 94-113 - Fabrice Bouquet, Bruno Legeard:
Reification of Executable Test Scripts in Formal Specicifation-Based Test Generation: The Java Card Transaction Mechanism Case Study. FME 2003: 778-795 - Marc Boyer
, Mihaela Sighireanu:
Synthesis and Verification of Constraints in the PGM Protocol. FME 2003: 264-281 - Marco Bozzano, Antonella Cavallo, Massimo Cifaldi, Laura Valacca, Adolfo Villafiorita:
Improving Safety Assessment of Complex Systems: An Industrial Case Study. FME 2003: 208-222 - Lilian Burdy, Antoine Requet, Jean-Louis Lanet:
Java Applet Correctness: A Developer-Oriented Approach. FME 2003: 422-439 - Patrice Chalin:
Improving JML: For a Safer and More Effective Language. FME 2003: 440-461 - Michel Charpentier:
Composing Invariants. FME 2003: 401-421 - Daniele Compare, Paola Inverardi, Patrizio Pelliccione
, Alessandra Sebastiani:
Integrating Model-Checking Architectural Analysis and Validation in a Real Software Life-Cycle. FME 2003: 114-132 - Ewen Denney, Bernd Fischer:
Correctness of Source-Level Safety Policies. FME 2003: 894-913 - Jin Song Dong, Jing Sun, Hai H. Wang:
Checking and Reasoning about Semantic Web through Alloy. FME 2003: 796-813 - Adolfo Duran, Ana Cavalcanti, Augusto Sampaio:
A Strategy for Compiling Classes, Inheritance, and Dynamic Binding. FME 2003: 301-320 - Pascal Fenkam, Harald C. Gall, Mehdi Jazayeri:
Constructing Deadlock Free Event-Based Applications: A Rely/Guarantee Approach. FME 2003: 636-657 - Colin J. Fidge
:
Verifying Emulation of Legacy Mission Computer Systems. FME 2003: 187-207 - Marcelo F. Frias
, Carlos López Pombo, Gabriel Baum, Nazareno Aguirre, T. S. E. Maibaum:
Taking Alloy to the Movies. FME 2003: 678-697 - Sabine Glesner:
Program Checking with Certificates: Separating Correctness-Critical Code. FME 2003: 758-777 - Michael Goldsmith, Nick Moffat, Bill Roscoe, Tim Whitworth, Irfan Zakiuddin:
Watchdog Transformations for Property-Oriented Model-Checking. FME 2003: 600-616 - Arie Gurfinkel
, Marsha Chechik:
Generating Counterexamples for Multi-valued Model-Checking. FME 2003: 503-521 - Ian J. Hayes
, Michael A. Jackson, Cliff B. Jones
:
Determining the Specification of a Control System from That of Its Environment. FME 2003: 154-169 - Neil Henderson:
Proving the Correctness of Simpson's 4-Slot ACM Using an Assertional Rely-Guarantee Proof Method. FME 2003: 244-263 - Gerard J. Holzmann:
Trends in Software Verification. FME 2003: 40-50 - Kouichi Kishida:
Looking Back to the Future: Thoughts on Paradigm Shift in Software Development. FME 2003: 1-6 - Olga Kouchnarenko
, Arnaud Lanoix:
Refinement and Verification of Synchronized Component-Based Systems. FME 2003: 341-358 - Thomas A. Kuhn, David von Oheimb:
Interacting State Machines for Mobility. FME 2003: 698-718 - Marc Lettrari:
Using Abstractions for Heuristic State Space Exploration of Reactive Object-Oriented Systems. FME 2003: 462-481 - Michael Leuschel, Michael J. Butler:
ProB: A Model Checker for B. FME 2003: 855-874
skipping 20 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-10 20:53 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint