Refinement Composition Using Doubly Labeled Transition Graphs
暂无分享,去创建一个
[1] Linda Null,et al. The essentials of computer organization and architecture , 2003 .
[2] Gary Chartrand,et al. Introduction to Graph Theory , 2004 .
[3] Radha Jagadeesan,et al. Modal Transition Systems: A Foundation for Three-Valued Program Analysis , 2001, ESOP.
[4] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[5] Faron Moller,et al. On the computational complexity of bisimulation , 1995, CSUR.
[6] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[7] David A. Schmidt. From Trace Sets to Modal-Transition Systems by Stepwise Abstract Interpretation , 2003 .
[8] Robert E. Tarjan,et al. Three Partition Refinement Algorithms , 1987, SIAM J. Comput..
[9] Dennis Dams,et al. Abstract interpretation and partition refinement for model checking , 1996 .
[10] David L. Bibighaus,et al. Applying Doubly Labeled Transition Systems to the Refinement Paradox , 2005 .
[11] Eerke A. Boiten,et al. Recent Advances in Refinement , 2003, Abstract State Machines.
[12] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[13] Howard Bowman,et al. Weak Refinement in Z , 1997, ZUM.
[14] David A. Schmidt. Structure-Preserving Binary Relations for Program Abstraction , 2002, The Essence of Computation.
[15] Kim G. Larsen,et al. A modal process logic , 1988, [1988] Proceedings. Third Annual Information Symposium on Logic in Computer Science.
[16] Andrzhei︠a︡ Mostowski,et al. Set theory : with an introduction to descriptive set theory , 1976 .
[17] Anthony Hall,et al. Correctness by Construction: Developing a Commercial Secure System , 2002, IEEE Softw..
[18] Carla Piazza,et al. Preserving ( Security ) Properties under Action Refinement ? , 2004 .