


default search action
Formal Methods in System Design, Volume 51
Volume 51, Number 1, August 2017
- Ezio Bartocci

, Rupak Majumdar:
Introduction to the special issue on runtime verification. 1-4 - Jyotirmoy V. Deshmukh, Alexandre Donzé

, Shromona Ghosh, Xiaoqing Jin, Garvit Juniwal, Sanjit A. Seshia:
Robust online monitoring of signal temporal logic. 5-30 - Patrick Moosbrugger, Kristin Y. Rozier, Johann Schumann:

R2U2: monitoring and diagnosis of security threats for unmanned aerial systems. 31-61 - Dung T. Phan

, Junxing Yang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Collision avoidance for mobile robots with limited sensing and limited information about moving obstacles. 62-86 - Adrian Francalanza

, Luca Aceto, Anna Ingólfsdóttir:
Monitorability for the Hennessy-Milner logic with recursion. 87-116 - Ali Kassem, Yliès Falcone, Pascal Lafourcade

:
Formal analysis and offline monitoring of electronic exams. 117-153 - Srinivas Pinisetty

, Viorel Preoteasa, Stavros Tripakis
, Thierry Jéron
, Yliès Falcone, Hervé Marchand:
Predictive runtime enforcement. 154-199 - Wolfgang Ahrendt

, Jesús Mauricio Chimento, Gordon J. Pace, Gerardo Schneider
:
Verifying data- and control-oriented properties combining static and runtime verification: theory and tools. 200-265
Volume 51, Number 2, November 2017
- Georg Gottlob, Thomas A. Henzinger, Georg Weissenbacher

:
Preface of the Special Issue in Memoriam Helmut Veith. 267-269 - Igor Konnov

, Marijana Lazic
, Helmut Veith, Josef Widder
:
Para2: parameterized path reduction, acceleration, and SMT for reachability in threshold-guarded distributed algorithms. 270-307 - Niklas Büscher

, Martin Franz, Andreas Holzer, Helmut Veith, Stefan Katzenbeisser:
On compiling Boolean circuits optimized for secure multi-party computation. 308-331 - Bettina Könighofer

, Mohammed Alshiekh, Roderick Bloem
, Laura R. Humphrey, Robert Könighofer, Ufuk Topcu
, Chao Wang:
Shield synthesis. 332-361 - William R. Harris

, Somesh Jha, Thomas W. Reps, Sanjit A. Seshia:
Program synthesis for interactive-security systems. 362-394 - Frederic Doucet, Robert P. Kurshan

:
A methodology to take credit for high-level verification during RTL verification. 395-418 - Johann A. Makowsky, Anna Zamansky:

Keeping logic in the trivium of computer science: a teaching perspective. 419-430
Volume 51, Number 3, December 2017
- Alberto Griggio

, Philipp Rümmer:
Preface to special issue on satisfiability modulo theories. 431-432 - Martin Bromberger

, Christoph Weidenbach:
New techniques for linear arithmetic: cubes and equalities. 433-461 - Vu Xuan Tung

, To Van Khanh
, Mizuhito Ogawa:
raSAT: an SMT solver for polynomial constraints. 462-499 - Andrew Reynolds, Tim King, Viktor Kuncak

:
Solving quantified linear arithmetic by counterexample-guided instantiation. 500-532 - Andreas Fellner

, Pascal Fontaine, Bruno Woltzenlogel Paleo:
NP-completeness of small conflict set generation for congruence closure. 533-544 - Francesco Alberti, Silvio Ghilardi

, Elena Pagani
:
Cardinality constraints for arrays (decidability results and applications). 545-574 - Constantin Enea, Ondrej Lengál

, Mihaela Sighireanu, Tomás Vojnar
:
Compositional entailment checking for a fragment of separation logic. 575-607 - Aina Niemetz

, Mathias Preiner
, Armin Biere
:
Propagation based local search for bit-precise reasoning. 608-636

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














