雪上轻舟飞过 发表于 2025-4-1 05:28:19

Hoare Logic for ARM Machine Code,verse pointer-based data structures. The presented work has been mechanised in the HOL4 theorem prover and is currently being used to verify ARM machine code implementations of arithmetic and cryptographic operations.

极深 发表于 2025-4-1 07:57:57

Conference proceedings 2007n, April 17–19, 2007. This event, FSEN 2007, was organized by the School of Computer Science at the Institute for Studies in Fundamental Sciences (IPM) in Iran, in cooperation with the ACM SIGSOFT and IFIP WG 2.2, and was additionally supported by the University of Tehran, Sharif University of Te- n

粘土 发表于 2025-4-1 12:04:44

http://reply.papertrans.cn/48/4721/472043/472043_63.png

osteoclasts 发表于 2025-4-1 17:37:48

Is Your Security Protocol on Time ?,respondence property so that attacks can be also discovered when some time constraints are not satisfied. As case studies we verify generalized authentication of KERBEROS, TMN, Neumann Stubblebine Protocol, Andrew Secure Protocol, WMF, and NSPK.

overrule 发表于 2025-4-1 19:55:24

Formal Testing of Systems Presenting Soft and Hard Deadlines,roduces several reasonable alternatives to define appropriate ., that is, relations to decide wether an implementation is correct with respect to a specification. In addition to introduce these relations, we define a testing framework to test implementations.

GUISE 发表于 2025-4-2 00:45:07

Action Abstraction in Timed Process Algebra,med process algebras. Characteristic for this approach is that in abstracting from an action, also its timing is abstracted from. We define an abstraction operator and a timed variant of rooted branching bisimilarity and establish that this notion is an equivalence relation and a congruence.
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: International Symposium on Fundamentals of Software Engineering; International Sympos Farhad Arbab,Marjan Sirjani Conference proceedings 20