![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2014
- Rahul Sharma, Alex Aiken:
From Invariant Checking to Invariant Inference Using Randomized Search. CAV 2014: 88-105 - Pranav Garg, Christof Löding, P. Madhusudan, Daniel Neider
:
ICE: A Robust Framework for Learning Invariants. CAV 2014: 69-87 - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen
, Lukás Holík
, Ahmed Rezine, Philipp Rümmer, Jari Stenman:
String Constraints for Verification. CAV 2014: 150-166 - Jade Alglave, Daniel Kroening
, Vincent Nimal, Daniel Poetzl:
Don't Sit on the Fence - A Static Analysis Approach to Automatic Fence Insertion. CAV 2014: 508-524 - Ethel Bardsley, Adam Betts, Nathan Chong, Peter Collingbourne, Pantazis Deligiannis
, Alastair F. Donaldson, Jeroen Ketema, Daniel Liew, Shaz Qadeer:
Engineering a Static Verification Tool for GPU Kernels. CAV 2014: 226-242 - Dirk Beyer
, Georg Dresler, Philipp Wendler
:
Software Verification in the Google App-Engine Cloud. CAV 2014: 327-333 - Jesse Bingham, Joe Leslie-Hurd:
Verifying Relative Error Bounds Using Symbolic Simulation. CAV 2014: 277-292 - Johannes Birgmeier, Aaron R. Bradley, Georg Weissenbacher
:
Counterexample to Induction-Guided Abstraction-Refinement (CTIGAR). CAV 2014: 831-848 - Rodica Bozianu, Catalin Dima, Emmanuel Filiot:
Safraless Synthesis for Epistemic Temporal Specifications. CAV 2014: 441-456 - Tomás Brázdil, David Klaska, Antonín Kucera, Petr Novotný
:
Minimizing Running Costs in Consumption Systems. CAV 2014: 457-472 - Roberto Cavada, Alessandro Cimatti, Michele Dorigatti, Alberto Griggio
, Alessandro Mariotti, Andrea Micheli
, Sergio Mover, Marco Roveri, Stefano Tonetta:
The nuXmv Symbolic Model Checker. CAV 2014: 334-342 - Petr Cermák, Alessio Lomuscio
, Fabio Mogavero
, Aniello Murano
:
MCMAS-SLK: A Model Checker for the Verification of Strategy Logic Specifications. CAV 2014: 525-532 - Pavol Cerný, Thomas A. Henzinger, Arjun Radhakrishna, Leonid Ryzhyk, Thorsten Tarrach:
Regression-Free Synthesis for Concurrency. CAV 2014: 568-584 - Krishnendu Chatterjee, Martin Chmelik, Przemyslaw Daca:
CEGAR for Qualitative Analysis of Probabilistic Systems. CAV 2014: 473-490 - Chih-Hong Cheng, Chung-Hao Huang, Harald Ruess, Stefan Stattelmann:
G4LTL-ST: Automatic Generation of PLC Programs. CAV 2014: 541-549 - Omar Chowdhury, Limin Jia
, Deepak Garg, Anupam Datta:
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies. CAV 2014: 131-149 - Alessandro Cimatti
, Alberto Griggio
, Sergio Mover, Stefano Tonetta:
Verifying LTL Properties of Hybrid Systems with K-Liveness. CAV 2014: 424-440 - Byron Cook, Jasmin Fisher
, Benjamin A. Hall
, Samin Ishtiaq, Garvit Juniwal, Nir Piterman
:
Finding Instability in Biological Models. CAV 2014: 358-372 - Arlen Cox, Bor-Yuh Evan Chang, Sriram Sankaranarayanan:
QUICr: A Reusable Library for Parametric Abstraction of Sets and Numbers. CAV 2014: 866-873 - Loris D'Antoni, Rajeev Alur:
Symbolic Visibly Pushdown Automata. CAV 2014: 209-225 - Thomas Dillig, Isil Dillig, Swarat Chaudhuri:
Optimal Guard Synthesis for Memory Safety. CAV 2014: 491-507 - Bruno Dutertre:
Yices 2.2. CAV 2014: 737-744 - Hassan Eldib, Chao Wang:
Synthesis of Masking Countermeasures against Side Channel Attacks. CAV 2014: 114-130 - Javier Esparza
, Jan Kretínský:
From LTL to Deterministic Automata: A Safraless Compositional Approach. CAV 2014: 192-208 - Javier Esparza
, Ruslán Ledesma-Garza, Rupak Majumdar, Philipp J. Meyer
, Filip Niksic:
An SMT-Based Approach to Coverability Analysis. CAV 2014: 603-619 - Anna Lisa Ferrara, P. Madhusudan, Truc L. Nguyen, Gennaro Parlato
:
Vac - Verifier of Administrative Role-Based Access Control Policies. CAV 2014: 184-191 - Jean-Christophe Filliâtre, Léon Gondelman, Andrei Paskevich:
The Spirit of Ghost Code. CAV 2014: 1-16 - Milos Gligoric, Rupak Majumdar, Rohan Sharma, Lamyaa Eloussi, Darko Marinov:
Regression Test Selection for Distributed Software Histories. CAV 2014: 293-309 - Liana Hadarean, Kshitij Bansal, Dejan Jovanovic, Clark W. Barrett
, Cesare Tinelli
:
A Tale of Two Solvers: Eager and Lazy Approaches to Bit-Vectors. CAV 2014: 680-695 - Willem Hagemann:
Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections. CAV 2014: 407-423
skipping 28 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-25 10:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint