Scalable Control Of Asynchronous Boolean Networks | 0 | 0.34 | 2019 |
Model checking with fairness assumptions using PAT | 17 | 0.87 | 2014 |
Location Assurance And Privacy In Gnss Navigation | 0 | 0.34 | 2013 |
A New Access Control Scheme for Facebook-Style Social Networks | 9 | 0.52 | 2013 |
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends. | 8 | 0.49 | 2013 |
Special issue: software verification and testing | 0 | 0.34 | 2013 |
A Trust Framework for Evaluating GNSS Signal Integrity | 3 | 0.70 | 2013 |
Verification of Functional and Non-functional Requirements of Web Service Composition. | 12 | 0.58 | 2013 |
Verification of A Key Chain Based TTP Transparent CEM Protocol | 4 | 0.38 | 2011 |
A Study Of The Pdgf Signaling Pathway With Prism | 2 | 0.37 | 2011 |
Fast leader election in anonymous rings with bounded expected delay. | 2 | 0.39 | 2011 |
Selective location blinding using hash chains | 3 | 0.52 | 2011 |
Brief announcement: asynchronous bounded expected delay networks | 1 | 0.36 | 2010 |
On Probabilistic Alternating Simulations | 5 | 0.49 | 2010 |
Analysis of a receipt-free auction protocol in the applied pi calculus | 14 | 0.56 | 2010 |
Verification of Population Ring Protocols in PAT | 8 | 0.53 | 2009 |
PAT: Towards Flexible Verification under Fairness | 184 | 5.78 | 2009 |
Model-Driven Automatic Generation of Verified BPEL Code for Web Service Composition | 4 | 0.50 | 2009 |
On Automatic Verification of Self-Stabilizing Population Protocols | 11 | 0.69 | 2008 |
Is Timed Branching Bisimilarity a Congruence Indeed? | 2 | 0.38 | 2008 |
Leader Election in Anonymous Rings: Franklin Goes Probabilistic | 8 | 0.50 | 2008 |
Adapting the UPPAAL model of a distributed lift system | 2 | 0.41 | 2007 |
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus | 8 | 0.50 | 2007 |
Model checking a cache coherence protocol of a Java DSM implementation | 15 | 1.05 | 2007 |
Automating verification of cooperation, control, and design in traffic applications | 13 | 0.86 | 2007 |
Exact state set representations in the verification of linear hybrid systems with large discrete state space | 27 | 1.75 | 2007 |
Generalized Unsolicited Tests for Authentication Protocol Analysis | 2 | 0.38 | 2006 |
Metrics for Action-labelled Quantitative Transition Systems | 38 | 1.26 | 2006 |
Automatic verification of hybrid systems with large discrete state space | 7 | 0.61 | 2006 |
Measuring anonymity with relative entropy | 39 | 2.09 | 2006 |
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM | 8 | 0.55 | 2006 |
Cones and foci: A mechanical framework for protocol verification | 8 | 0.51 | 2006 |
Formal Verification of Timed Systems Using Cones and Foci | 1 | 0.39 | 2005 |
Simplifying Itai-Rodeh Leader Election for Anonymous Rings | 11 | 0.67 | 2005 |
Compositional reasoning for probabilistic finite-state behaviors | 14 | 0.68 | 2005 |
Is timed branching bisimilarity an equivalence indeed? | 9 | 0.54 | 2005 |
Abstraction of parallel uniform processes with data | 1 | 0.37 | 2004 |
Verifying a Sliding Window Protocol in µCRL | 6 | 0.47 | 2004 |
A model for slicing JAVA programs hierarchically | 14 | 0.81 | 2004 |
Analyzing the Redesign of a Distributed Lift System in UPPAAL | 1 | 0.38 | 2003 |
A formal software development approach using refinement calculus | 0 | 0.34 | 2001 |
A Formal Software Development Approach Based on COOZ and Refinement Calculus | 0 | 0.34 | 1999 |