Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Theoretical Computer Science,Software
Reference27 articles.
1. http://www-omega.imag.fr/ .
2. Behm P, Benoit P, Faivre A, Meynadier J-M (1999) METEOR: A successful application of B in a large project. In: Wing JM, Woodcock J, Davies J (eds) Proceedings of the FM′99: World Congress on formal methods, Lecture notes in computer science, vol 1709, Springer-Verlag, pp 369–387
3. Bert D, Cave F (2000) Construction of finite labelled transition systems from B abstract system. In: Integrated formal methods, lecture notes in computer science, vol 1945, Springer-Verlag, pp 235–254
4. Bert D, Potet M-L, Stouls N (2005) GeneSyst: a tool to reason about behavioral aspects of B event specifications. Application to security properties. In: Proceedings of the ZB2005, lecture notes in computer science, vol 3455, Springer-Verlag, pp 299–318
5. Casset L (2002) Development of an embedded verifier for java card byte code using formal methods. In: FME′02, formal methods Europe, lecture notes in computer science, vol 2391, Springer-Verlag, pp 290–309
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献