Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2018
- Bernhard Beckert, Simon Bischof, Mihai Herda, Michael Kirsten, Marko Kleine Büning:
Using Theorem Provers to Increase the Precision of Dependence Analysis for Information Flow Control. ICFEM 2018: 284-300 - Nils Berg, Thomas Göthel, Armin Danziger, Sabine Glesner:
Preserving Liveness Guarantees from Synchronous Communication to Asynchronous Unstructured Low-Level Languages. ICFEM 2018: 303-319 - Hadrien Bride, Jie Dong, Jin Song Dong, Zhé Hóu:
Towards Dependable and Explainable Machine Learning Using Automated Reasoning. ICFEM 2018: 412-416 - Hadrien Bride, Jin Song Dong, Zhé Hóu, Brendan P. Mahony, Martin Oxenham:
Towards Trustworthy AI for Autonomous Systems. ICFEM 2018: 407-411 - Aaron Craig, Alex Potanin, Lindsay Groves, Jonathan Aldrich:
Capabilities: Effects for Free. ICFEM 2018: 231-247 - Naipeng Dong, Tim Muller:
The Foul Adversary: Formal Models. ICFEM 2018: 37-53 - Xiaoning Du:
Towards Building a Generic Vulnerability Detection Platform by Combining Scalable Attacking Surface Analysis and Directed Fuzzing. ICFEM 2018: 464-468 - Yuan Fei, Huibiao Zhu:
Modeling and Verifying NDN Access Control Using CSP. ICFEM 2018: 143-159 - Dileepa Fernando:
Model Checking Nash-Equilibrium - Automatic Verification of Robustness in Distributed Systems. ICFEM 2018: 436-440 - Dileepa Fernando, Naipeng Dong, Cyrille Jégourel, Jin Song Dong:
Verification of Strong Nash-equilibrium for Probabilistic BAR Systems. ICFEM 2018: 106-123 - Michael Foster, Ramsay G. Taylor, Achim D. Brucker, John Derrick:
Formalising Extended Finite State Machine Transition Merging. ICFEM 2018: 373-387 - Paul Gainer, Sven Linker, Clare Dixon, Ullrich Hustadt, Michael Fisher:
The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled Oscillators. ICFEM 2018: 160-176 - Cunjing Ge, Jiwei Yan, Jun Yan, Jian Zhang:
Checking Activity Transition Systems with Back Transitions Against Assertions. ICFEM 2018: 388-403 - Milad K. Ghale:
Engineering Software for Modular Formalisation and Verification of STV Algorithms. ICFEM 2018: 459-463 - Ian J. Hayes:
Engineering a Theory of Concurrent Programming. ICFEM 2018: 3-18 - Kan Jiang:
Combining Deep Learning and Probabilistic Model Checking in Sports Analytics. ICFEM 2018: 446-449 - Teck Ping Khoo:
Model Based Testing of Cyber-Physical Systems. ICFEM 2018: 423-426 - Teck Ping Khoo, Jun Sun:
The Miles Before Formal Methods - A Case Study on Modeling and Analyzing a Passenger Lift System. ICFEM 2018: 54-69 - Tsutomu Kobayashi, Fuyuki Ishikawa:
Analysis on Strategies of Superposition Refinement of Event-B Specifications. ICFEM 2018: 357-372 - Yi Li:
Developing Reliable Component-Based Software in Mediator. ICFEM 2018: 432-435 - Yuekang Li:
Principled Greybox Fuzzing. ICFEM 2018: 455-458 - Timm Liebrenz:
Service-Oriented Design and Verification of Hybrid Control Systems. ICFEM 2018: 427-431 - Timm Liebrenz, Paula Herber, Sabine Glesner:
Deductive Verification of Hybrid Control Systems Modeled in Simulink with KeYmaera X. ICFEM 2018: 89-105 - Kulani Mahadewa:
Security Analysis of Smart Home Implementations. ICFEM 2018: 450-454 - Amanda Mahony:
Formalising Performance Guarantees in Meta-Reinforcement Learning. ICFEM 2018: 469-472 - Diego Marmsoler:
A Framework for Interactive Verification of Architectural Design Patterns in Isabelle/HOL. ICFEM 2018: 251-269 - Matthieu Martel:
Strongly Typed Numerical Computations. ICFEM 2018: 197-214 - Colin F. Snook, Thai Son Hoang, Dana Dghaym, Michael J. Butler, Tomas Fischer, Rupert Schlick, Keming Wang:
Behaviour-Driven Formal Model Development. ICFEM 2018: 21-36 - Vladimír Still, Jiri Barnat:
Model Checking of C++ Programs Under the x86-TSO Memory Model. ICFEM 2018: 124-140 - Inna Vistbakka, Amin Majd, Elena Troubitsyna:
Deriving Mode Logic for Autonomous Resilient Systems. ICFEM 2018: 320-336
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-07 05:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint