Sciweavers

CAV
1998
Springer
117views Hardware» more  CAV 1998»
13 years 11 months ago
MONA 1.x: New Techniques for WS1S and WS2S
Jacob Elgaard, Nils Klarlund, Anders Møller
CAV
1998
Springer
66views Hardware» more  CAV 1998»
13 years 11 months ago
Verification of Floating-Point Adders
Yirng-An Chen, Randal E. Bryant
CAV
1998
Springer
98views Hardware» more  CAV 1998»
13 years 11 months ago
Verification of Timed Systems Using POSETs
This paper presents a new algorithm for efficiently verifying timed systems. The new algorithm represents timing information using geometric regions and explores the timed state sp...
Wendy Belluomini, Chris J. Myers
CAV
1998
Springer
100views Hardware» more  CAV 1998»
13 years 11 months ago
Mechanising BAN Kerberos by the Inductive Method
The version of Kerberos presented by Burrows et al. [5] is fully mechanised using the Inductive Method. Two models are presented, allowing respectively the leak of any session keys...
Giampaolo Bella, Lawrence C. Paulson
CAV
1998
Springer
75views Hardware» more  CAV 1998»
13 years 11 months ago
MOCHA: Modularity in Model Checking
Rajeev Alur, Thomas A. Henzinger, Freddy Y. C. Man...