Filter your results
- 58
- 58
- 58
- 6
- 5
- 4
- 8
- 2
- 4
- 6
- 12
- 9
- 2
- 2
- 4
- 58
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.219-230, ⟨10.1007/978-3-319-24369-6_18⟩
Conference papers
hal-01444467v1
|
||
|
Scan: A Simple Coordination Workbench21th International Conference on Coordination Languages and Models (COORDINATION), Jun 2019, Kongens Lyngby, Denmark. pp.75-91, ⟨10.1007/978-3-030-22397-7_5⟩
Conference papers
hal-02365497v1
|
||
|
Verbal Use Case Specifications for Informal Requirements Elicitation7th Workshop on Human-Computer Interaction and Visualization (HCIV), Aug 2011, Rostock, Germany. pp.165-174, ⟨10.1007/978-3-642-54894-9_12⟩
Conference papers
hal-01414703v1
|
||
|
Validating SCTP Simultaneous Open Procedure5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.233-249, ⟨10.1007/978-3-642-40213-5_15⟩
Conference papers
hal-01514670v1
|
||
|
Modeling and Efficient Verification of Broadcasting Actors6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.69-83, ⟨10.1007/978-3-319-24644-4_5⟩
Conference papers
hal-01446611v1
|
||
|
Ubiquitous Verification of Ubiquitous Systems8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.47-58, ⟨10.1007/978-3-642-16256-5_7⟩
Conference papers
hal-01055377v1
|
||
|
Bounded Model Checking of Graph Transformation Systems via SMT Solving15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.178-192, ⟨10.1007/978-3-642-38592-6_13⟩
Conference papers
hal-01515236v1
|
||
|
Using Backward Induction Techniques in (Timed) Security Protocols Verification12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.265-276, ⟨10.1007/978-3-642-40925-7_25⟩
Conference papers
hal-01496073v1
|
||
|
Efficient Operational Semantics for $ EB ^3$ for Verification of Temporal Properties5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.133-149, ⟨10.1007/978-3-642-40213-5_9⟩
Conference papers
hal-01514655v1
|
||
|
On Implementing Symbolic Controllability22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.350-369, ⟨10.1007/978-3-030-50029-0_22⟩
Conference papers
hal-03273999v1
|
||
|
Verification of concurrent design patterns with dataCOORDINATION 2019 - 21st International Conference on Coordination Models and Languages, Jun 2019, Kongens Lyngby, Denmark. pp.161-181, ⟨10.1007/978-3-030-22397-7_10⟩
Conference papers
hal-02143782v1
|
||
|
A model checking based approach for detecting SDN racesICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.194-211, ⟨10.1007/978-3-030-31280-0_12⟩
Conference papers
hal-02448964v1
|
||
|
A New Handwritten Signature Verification System Based on the Histogram of Templates Feature and the Joint Use of the Artificial Immune System with SVM6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.119-127, ⟨10.1007/978-3-319-89743-1_11⟩
Conference papers
hal-01913916v1
|
||
|
Translation Validation for Synchronous Data-Flow Specification in the SIGNAL Compiler35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.66-80, ⟨10.1007/978-3-319-19195-9_5⟩
Conference papers
hal-01767328v1
|
||
|
Purpose-Based Policy Enforcement in Actor-Based Systems7th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2017, Teheran, Iran. pp.196-211, ⟨10.1007/978-3-319-68972-2_13⟩
Conference papers
hal-01760856v1
|
||
|
Formal Software Verification: How Close Are We?Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.1, ⟨10.1007/978-3-642-13464-7_1⟩
Conference papers
hal-01055211v1
|
||
|
Formal Specification and Verification of CRDTs34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.33-48, ⟨10.1007/978-3-662-43613-4_3⟩
Conference papers
hal-01398007v1
|
||
|
On a Verification Framework for Certifying Distributed Algorithms: Distributed Checking and Consistency38th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2018, Madrid, Spain. pp.161-180, ⟨10.1007/978-3-319-92612-4_9⟩
Conference papers
hal-01824815v1
|
||
|
Towards a Formally Verified EVM in Production Environment22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.341-349, ⟨10.1007/978-3-030-50029-0_21⟩
Conference papers
hal-03273991v1
|
||
|
Access Control and Query Verification for Untrusted Databases27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.211-225, ⟨10.1007/978-3-642-39256-6_14⟩
Conference papers
hal-01490706v1
|
||
|
Coordination of ECA Rules by Verification and ControlCOORDINATION 2014 - 16th International Conference on Coordination Models and Languages, Jun 2014, Berlin, Germany. pp.33-48, ⟨10.1007/978-3-662-43376-8_3⟩
Conference papers
hal-01290066v1
|
||
|
Formal Methods for Railway Disasters Prevention2nd International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2017, Sofia, Bulgaria. pp.161-176, ⟨10.1007/978-3-030-18293-9_14⟩
Conference papers
hal-02280313v1
|
||
|
Separating Obligations of Subjects and Handlers for More Flexible Event Type Verification12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.65-80, ⟨10.1007/978-3-642-39614-4_5⟩
Conference papers
hal-01492777v1
|
||
|
From Event-B Models to Dafny Code Contracts6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.308-315, ⟨10.1007/978-3-319-24644-4_21⟩
Conference papers
hal-01446608v1
|
||
|
Effectiveness for Input Output Conformance Simulation iocos̱34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.100-116, ⟨10.1007/978-3-662-43613-4_7⟩
Conference papers
hal-01398009v1
|
||
|
Analyzing Computer Game Narratives9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.224-231, ⟨10.1007/978-3-642-15399-0_21⟩
Conference papers
hal-01055639v1
|
||
|
Expert Knowledge Based Design and Verification of Secure Systems with Embedded DevicesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.194-210, ⟨10.1007/978-3-319-10975-6_15⟩
Conference papers
hal-01403995v1
|
||
|
Metrics for Differential Privacy in Concurrent Systems34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.199-215, ⟨10.1007/978-3-662-43613-4_13⟩
Conference papers
hal-00879140v2
|
||
|
Formal Verification of Virtual Network Function Graphs in an SP-DevOps Context4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.253-262, ⟨10.1007/978-3-319-24072-5_18⟩
Conference papers
hal-01757560v1
|
||
|
Uniform Protection for Multi-exposed Targets34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.182-198, ⟨10.1007/978-3-662-43613-4_12⟩
Conference papers
hal-01398016v1
|
- 1
- 2