Author:
Pemmasani Giridhar,Ramakrishnan C. R.,Ramakrishnan I. V.
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. R. Alur and D. Dill. A theory of timed automata. Theoretical Computer Science, 126:183–235, 1994.
2. S. Basu, S. A. Smolka, and O. R. Ward. Model checking the Java Meta-Locking algorithm. In Proceedings of 7th IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2000), Edinburgh, Scotland, April 2000.
3. Lect Notes Comput Sci;J. Bengtsson,1996
4. T. H. Cormen, C. E. Leiserson, and R. L. Rivest. Introduction to Algorithms. The MIT Press, 1999.
5. G. Delzanno and S. Etalle. Transforming a proof system into prolog for verifying security protocols. In International Workshop on Logic-based Program Synthesis and Transformation, November 2001.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献