Filter your results
- 5
- 5
- 5
- 5
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Formal Specification and Verification of CRDTs34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.33-48, ⟨10.1007/978-3-662-43613-4_3⟩
Conference papers
hal-01398007v1
|
||
|
Effectiveness for Input Output Conformance Simulation iocos̱34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.100-116, ⟨10.1007/978-3-662-43613-4_7⟩
Conference papers
hal-01398009v1
|
||
|
Metrics for Differential Privacy in Concurrent Systems34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.199-215, ⟨10.1007/978-3-662-43613-4_13⟩
Conference papers
hal-00879140v2
|
||
|
Denial-of-Service Security Attack in the Continuous-Time World34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.149-165, ⟨10.1007/978-3-662-43613-4_10⟩
Conference papers
hal-01398014v1
|
||
|
Uniform Protection for Multi-exposed Targets34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.182-198, ⟨10.1007/978-3-662-43613-4_12⟩
Conference papers
hal-01398016v1
|