Filter your results
- 14
- 1
- 14
- 1
- 15
- 15
- 15
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Effectiveness for Input Output Conformance Simulation iocos̱34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.100-116, ⟨10.1007/978-3-662-43613-4_7⟩
Conference papers
hal-01398009v1
|
||
|
Verifying Security Policies Using Host Attributes34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩
Conference papers
hal-01398013v1
|
||
|
Formal Specification and Verification of CRDTs34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.33-48, ⟨10.1007/978-3-662-43613-4_3⟩
Conference papers
hal-01398007v1
|
||
|
Property Specification Made Easy: Harnessing the Power of Model Checking in UML Designs34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.17-32, ⟨10.1007/978-3-662-43613-4_2⟩
Conference papers
hal-01398006v1
|
||
|
On the Step Branching Time Closure of Free-Choice Petri Nets34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.232-248, ⟨10.1007/978-3-662-43613-4_15⟩
Conference papers
hal-01398018v1
|
||
|
Coinductive Definition of Distances between Processes: Beyond Bisimulation Distances34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.249-265, ⟨10.1007/978-3-662-43613-4_16⟩
Conference papers
hal-01398019v1
|
||
|
Quantitative Information Flow under Generic Leakage Functions and Adaptive Adversaries34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.166-181, ⟨10.1007/978-3-662-43613-4_11⟩
Conference papers
hal-01398015v1
|
||
|
Dimming Relations for the Efficient Analysis of Concurrent Systems via Action Abstraction34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.216-231, ⟨10.1007/978-3-662-43613-4_14⟩
Conference papers
hal-01398017v1
|
||
|
Denial-of-Service Security Attack in the Continuous-Time World34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.149-165, ⟨10.1007/978-3-662-43613-4_10⟩
Conference papers
hal-01398014v1
|
||
|
Type Checking Liveness for Collaborative Processes with Bounded and Unbounded Recursion34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.1-16, ⟨10.1007/978-3-662-43613-4_1⟩
Conference papers
hal-01398004v1
|
||
|
Uniform Protection for Multi-exposed Targets34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.182-198, ⟨10.1007/978-3-662-43613-4_12⟩
Conference papers
hal-01398016v1
|
||
|
Formal Techniques for Distributed Objects, Components, and SystemsSpringer, LNCS-8461, 2014, Lecture Notes in Computer Science, 978-3-662-43612-7. ⟨10.1007/978-3-662-43613-4⟩
Books
hal-01398026v1
|
||
|
A Program Logic for Verifying Secure Routing Protocols34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.117-132, ⟨10.1007/978-3-662-43613-4_8⟩
Conference papers
hal-01398011v1
|
||
|
Actor- and Task-Selection Strategies for Pruning Redundant State-Exploration in Testing34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.49-65, ⟨10.1007/978-3-662-43613-4_4⟩
Conference papers
hal-01398008v1
|
||
|
Formal Verification of Complex Properties on PLC Programs34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.284-299, ⟨10.1007/978-3-662-43613-4_18⟩
Conference papers
hal-01398021v1
|