default search action
Trustworthy Software 2006: Saarbrücken, Germany
- Serge Autexier, Stephan Merz, Leendert W. N. van der Torre, Reinhard Wilhelm, Pierre Wolper:
Workshop "Trustworthy Software" 2006, May 18-19, 2006, Saarland University, Saarbrücken, Germany. OASIcs 3, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2006 - Eugen Zalinescu, Véronique Cortier, Michaël Rusinowitch:
Relating two standard notions of secrecy. - Serge Autexier, Stephan Merz, Leendert W. N. van der Torre, Reinhard Wilhelm, Pierre Wolper:
Preface -- Workshop Trustworthy Software 2006. - Michael Hilker, Christoph Schommer:
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems. - Arnaud Lanoix, Dieu Donné Okalas Ossami, Jeanine Souquières:
An Operator-based Approach to Incremental Development of Conform Protocol State Machines. - Stephan Neuhaus:
Isolating Intrusions by Automatic Experiments. - Claude Kirchner, Pierre-Etienne Moreau, Antoine Reilles:
Formal Validation of Pattern Matching code. - Ina Schaefer, Arnd Poetzsch-Heffter:
Using Abstraction in Modular Verification of Synchronous Adaptive Systems. - Julien Schmaltz, Dominique Borrione:
Formalizing On Chip Communications in a Functional Style. - Björn Wachter:
Explaining Data Type Reduction in the Shape Analysis Framework. - Jan Reineke:
Shape Analysis of Sets. - Axel Legay, Luca de Alfaro, Marco Faella:
An Introduction to the Tool Ticc.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.