Search

Your search keyword '"Automated verification"' showing total 240 results

Search Constraints

Start Over You searched for: Descriptor "Automated verification" Remove constraint Descriptor: "Automated verification"
240 results on '"Automated verification"'

Search Results

1. Verifying Cake-Cutting, Faster

2. Blockchain-Enabled IoV Framework for Establishing Automated Communication Using Smart Contract

3. Towards Building Verifiable CPS using Lingua Franca.

4. A Relational Program Logic with Data Abstraction and Dynamic Framing.

5. Deciding a Fragment of -Privacy

6. Secure Key Management Policies in Strand Spaces

7. Gobra: Modular Specification and Verification of Go Programs

8. Quantitative Access Control Policy Analysis and Repair Using Model Counting

9. Framework to Verify Distributed IoT Solutions for Traffic Analysis in ATN Stations

10. Random Probing Security: Verification, Composition, Expansion and New Constructions

11. Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations

12. Concise outlines for a complex logic: a proof outline checker for TaDA.

13. Dependable learning-enabled multiagent systems.

14. Mean-Payoff Games with ω-Regular Specifications.

15. Adventures in the Analysis of Access Control Policies

16. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults

17. An Automatically Verified Prototype of the Tokeneer ID Station Specification.

18. Automated Verification of Building Components Using BIM Models and Point Clouds

19. RustHorn: CHC-based Verification for Rust Programs.

20. Rational verification: game-theoretic verification of multi-agent systems.

21. Towards efficient verification of population protocols.

22. Formal Verification of a Vehicle-to-Vehicle (V2V) Messaging System

23. On Automated Detection of Multi-Protocol Attacks Using AVISPA

25. Techniques and tools for the verification of concurrent systems

26. Mean-Payoff Games with ω-Regular Specifications

27. Small model theorems for data independent systems in Alloy

28. A game-based approximate verification of deep neural networks with provable guarantees.

29. AUTOMATION AND GAMIFICATION OF COMPUTER SCIENCE STUDY.

30. Quicksort Revisited : Verifying Alternative Versions of Quicksort

31. A Robust Framework for Securing Composed Web Services

32. Analyzing and Fixing the QACCE Security of QUIC

33. Improving the Synthesis of Annotations for Partially Automated Deductive Verification

34. LoRe: A Programming Model for Verifiably Safe Local-First Software (Artifact)

35. LoRe: A Programming Model for Verifiably Safe Local-First Software (Extended Abstract)

36. Model-Driven Information Flow Security for Component-Based Systems

37. Inductive verification of data model invariants in web applications using first-order logic.

38. Checking business process evolution.

39. LoRe: A Programming Model for Verifiably Safe Local-First Software (Extended Abstract)

40. LoRe: A Programming Model for Verifiably Safe Local-First Software (Artifact)

41. Quantifying the Similarity of BPMN Processes

42. Automated Verification of Model Transformations in the Automotive Industry

43. Dynamically-Driven Timed Automaton Abstractions for Proving Liveness of Continuous Systems

44. A hardware-software system for the automation of verification and calibration of oil metering units secondary equipment.

45. A METHODOLOGY FOR DESIGN SPACE EXPLORATION OF REAL-TIME LOCATION SYSTEMS

46. Deductive Verification of the Sliding Window Protocol

47. Formal methods and automated verification of critical systems.

49. Modeling and Verification of Insider Threats Using Logical Analysis.

50. Intruder deducibility constraints with negation. Decidability and application to secured service compositions.

Catalog

Books, media, physical & digital resources