Author:
Kammüller Florian,Preibusch Sören
Publisher
Springer Science and Business Media LLC
Subject
General Computer Science,General Computer Science
Reference20 articles.
1. Bäumler S, Balser M, Dunets A, Reif W, Schmitt J (2006) Verification of Medical Guidelines by Model Checking – A Case Study http://spinroot.com/spin/Workshops/ws06/027.pdf
2. Bundesamt für Sicherheit in der Informationsgesellschaft (BSI) (2005) Common Criteria for Information Technology Security Evaluation, Part 3. http://www.bsi.de/cc/ccpart3v2_3.pdf
3. Burch JR, Clarke EM, Long DE (1994) Symbolic Model Checking for Sequential Circuit Verification. IEEE Trans Comp Aided Design Integr Circ Syst 13:401–424
4. Chan W, Anderson RJ, Beame P, Burns S, Modugno F, Notkin D, Reese JD (1998) Model checking large software specifications. IEEE Trans Softw Eng 24(7):498–520
5. Cimatti A, Clarke EM, Giunchiglia F, Roveri M (2000) NuSMV: a new symbolic model verifier. In: Halbwachs N, Peled D (eds) International Conference on Computer-Aided Verification (CAV’99), LNCS, vol 1633, pp 495–499, Springer, Berlin Heidelberg
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Application of Verification Techniques to Security;Advanced Research and Trends in New Technologies, Software, Human-Computer Interaction, and Communicability;2014
2. Robust synthesis for real-time systems;Theoretical Computer Science;2014-01
3. Sensing and Autonomous Urban Reconnaissance Using Unmanned Robotic Vehicles;AIAA Infotech@Aerospace Conference;2009-04-06