


default search action
Formal Methods in System Design, Volume 44
Volume 44, Number 1, February 2014
- Albert Benveniste, Claude Jard, Ajay Kattepur, Sidney Rosario, John A. Thywissen

:
QoS-aware management of monotonic service orchestrations. 1-43 - Fang Yu, Muath Alkhalaf, Tevfik Bultan, Oscar H. Ibarra:

Automata-based symbolic string analysis for vulnerability detection. 44-70 - Stefan Ratschan:

Safety verification of non-linear hybrid systems is quasi-decidable. 71-90 - Ludwig Griebl, Johann Schuster:

Some notes on the abstraction operation for multi-terminal binary decision diagrams. 91-99
Volume 44, Number 2, April 2014
- Thomas Martin Gawlitza, Helmut Seidl:

Numerical invariants through convex relaxation and max-strategy iteration. 101-148 - Guy Avni, Orna Kupferman:

An abstraction-refinement framework for trigger querying. 149-175 - Yi Li

, Jin Song Dong, Jing Sun
, Yang Liu
, Jun Sun
:
Model checking approach to automated planning. 176-202
Volume 44, Number 3, June 2014
- Thomas Reinbacher, Matthias Függer, Jörg Brauer:

Runtime verification of embedded real-time systems. 203-239 - Jinjin Zhang, Zhaohui Zhu:

A modal characterization of alternating approximate bisimilarity. 240-263 - Uraz Cengiz Türker, Hüsnü Yenigün:

Hardness and inapproximability of minimizing adaptive distinguishing sequences. 264-294

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














