Memory-Ecient Algorithms for the Verication of Temporal Properties
暂无分享,去创建一个
[1] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[2] C. H. West,et al. Automated validation of a communications protocol: the CCITT X.21 recommendation , 1978 .
[3] Harry Rudin,et al. A Validation Technique for Tightly Coupled Protocols , 1982, IEEE Transactions on Computers.
[4] Carl A. Sunshine. Experience with automated Protocol Verification , 1983, Protocol Specification, Testing, and Verification.
[5] Alfred V. Aho,et al. Data Structures and Algorithms , 1983 .
[6] B. Hailpern,et al. Tools for Verifying Network Protocols , 1989, Logics and Models of Concurrent Systems.
[7] G. J. Holzmann,et al. Tracing protocols , 1985, AT&T Technical Journal.
[8] A. P. Sistla,et al. Automatic verification of finite-state concurrent systems using temporal logic specifications , 1986, TOPL.
[9] Pierre Wolper,et al. An Automata-Theoretic Approach to Automatic Program Verification (Preliminary Report) , 1986, LICS.
[10] Pierre Wolper,et al. On the Relation of Programs and Computations to Models of Temporal Logic , 1987, Temporal Logic in Specification.
[11] Harry Rudin. Network Protocols and Tools to Help Produce Them , 1987 .
[12] Gerard J. Holzmann,et al. An improved protocol reachability analysis technique , 1988, Softw. Pract. Exp..
[13] Pierre Wolper,et al. Adding liveness properties to coupled finite-state machines , 1990, TOPL.
[14] Gerard J. Holzmann,et al. Design and validation of computer protocols , 1991 .
[15] Gerard J. Holzmann,et al. State-space caching revisited , 1992, Formal Methods Syst. Des..