Publisher
Springer International Publishing
Reference12 articles.
1. Alhawi, O.M., Mustafa, M.A., Cordeiro, L.C.: Finding security vulnerabilities in unmanned aerial vehicles using software verification. CoRR abs/1906.11488 (2019).
http://arxiv.org/abs/1906.11488
2. Biere, A., Cimatti, A., Clarke, E.M., Fujita, M., Zhu, Y.: Symbolic model checking using SAT procedures instead of BDDs. In: Proceedings 1999 Design Automation Conference (Cat. No. 99CH36361), pp. 317–320, June 1999.
https://doi.org/10.1109/DAC.1999.781333
3. Biere, A., Cimatti, A., Clarke, E.M., Strichman, O., Zhu, Y.: Bounded model checking. In: Advances in Computers, vol. 58, pp. 117–148. Elsevier (2003).
https://doi.org/10.1016/S0065-2458(03)58003-2
4. Lecture Notes in Computer Science;A Biere,1999
5. Bruynooghe, M., et al.: Predicate logic as a modeling language: modeling and solving some machine learning and data mining problems with IDP3. Theory Pract. Logic Program. 15(6), 783–817 (2015).
https://doi.org/10.1017/S147106841400009X