


default search action
19th MEMOCODE 2021: Virtual Event, China
- S. Arun-Kumar, Dominique Méry, Indranil Saha, Lijun Zhang:

MEMOCODE '21: 19th ACM-IEEE International Conference on Formal Methods and Models for System Design, Virtual Event, China, November 20 - 22, 2021. ACM 2021, ISBN 978-1-4503-9127-6 - Mohammed Barhoush, Alireza Mahzoon, Rolf Drechsler

:
Polynomial word-level verification of arithmetic circuits. 1-9 - Ignacio D. Lopez-Miguel

, Borja Fernández Adiego, Jean-Charles Tournier, Enrique Blanco Viñuela, Juan A. Rodríguez-Aguilar
:
Simplification of numeric variables for PLC model checking. 10-20 - Khalil Esper, Stefan Wildermann, Jürgen Teich:

Enforcement FSMs: specification and verification of non-functional properties of program executions on MPSoCs. 21-31 - Dominik Walter, Jürgen Teich:

LION: real-time I/O transfer control for massively parallel processor arrays. 32-43 - Mathis Niehage

, Arnd Hartmanns, Anne Remke:
Learning optimal decisions for stochastic hybrid systems. 44-55 - Abhinandan Panda, Srinivas Pinisetty, Partha S. Roop:

A secure insulin infusion system using verification monitors. 56-65 - Klaus Schneider

:
Translating structured sequential programs to dataflow graphs. 66-77 - Ennio Visconti, Ezio Bartocci

, Michele Loreti, Laura Nenzi:
Online monitoring of spatio-temporal properties for imprecise signals. 78-88 - Shenghao Yuan

, Jean-Pierre Talpin:
Verified functional programming of an IoT operating system's bootloader. 89-97 - Felix Freiberger

, Stefan Schupp, Holger Hermanns
, Erika Ábrahám
:
Controller verification meets controller code: a case study. 98-103 - Marcel Christian Werner, Klaus Schneider

:
Translation of continuous function charts to imperative synchronous quartz programs. 104-110 - Adam Petz, Grant Jurgensen, Perry Alexander:

Design and formal verification of a copland-based attestation protocol. 111-117 - Nicolas Basset, Thao Dang, Felix Gigler

, Cristinel Mateis
, Dejan Nickovic
:
Sampling of shape expressions with ShapEx. 118-125 - Farhaan Fowze, Tuba Yavuz:

SEESAW: a tool for detecting memory vulnerabilities in protocol stack implementations. 126-133 - Kelvin Anto

, Partha S. Roop, Akshya K. Swain:
Formal modelling of attack scenarios and mitigation strategies in IEEE 1588. 134-141

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














