Real World Verification Experiences from the Verisoft Email Client
暂无分享,去创建一个
[1] John Strang. Programming with Curses , 1986 .
[2] Gerhard Goos,et al. Verification of Compilers , 1999, Correct System Design.
[3] Patrick Cousot,et al. Modular Static Program Analysis , 2002, CC.
[4] Laurent Bussard. Authentication in ubiquitous computing , 2002 .
[5] Tobias Nipkow,et al. A Proof Assistant for Higher-Order Logic , 2002 .
[6] Hardi Hungar,et al. On the Verification of Cooperating Traffic Agents , 2003, FMCO.
[7] Norbert Schirmer,et al. A Verification Environment for Sequential Imperative Programs in Isabelle/HOL , 2005, LPAR.
[8] Wolfgang J. Paul,et al. Towards a Worldwide Verification Technology , 2005, VSTTE.
[9] Nikhil Kikkeri,et al. Challenges in the formal verification of complete state-of-the-art processors , 2005, 2005 International Conference on Computer Design.
[10] Wolfgang J. Paul,et al. Towards the Formal Verification of a C0 Compiler: Code Generation and Implementation Correctnes , 2005, SEFM.
[11] Mark A. Hillebrand,et al. On the Correctness of Operating System Kernels , 2005, TPHOLs.
[12] Bernhard Beckert,et al. A Method for Formalizing, Analyzing, and Verifying Secure User Interfaces , 2006, ICFEM.