default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 44 matches
- 1999
- Parosh Aziz Abdulla, Aurore Annichini, Saddek Bensalem, Ahmed Bouajjani, Peter Habermehl, Yassine Lakhnech:
Verification of Infinite-State Systems by Combining Abstraction and Reachability Analysis. CAV 1999: 146-159 - Parosh Aziz Abdulla, Ahmed Bouajjani, Bengt Jonsson, Marcus Nilsson:
Handling Global Conditions in Parameterized System Verification. CAV 1999: 134-145 - Rajeev Alur:
Timed Automata. CAV 1999: 8-22 - David A. Basin, Stefan Friedrich, Joachim Posegga, Harald Vogt:
Java Bytecode Verification by Model Checking. CAV 1999: 491-494 - Jason Baumgartner, Tamir Heyman, Vigyan Singhal, Adnan Aziz:
Model Checking the IBM Gigahertz Processor: An Abstraction Algorithm for High-Performance Netlists. CAV 1999: 72-83 - Gerd Behrmann, Kim Guldstrand Larsen, Justin Pearson, Carsten Weise, Wang Yi:
Efficient Timed Reachability Analysis Using Clock Difference Diagrams. CAV 1999: 341-353 - Béatrice Bérard, Laurent Fribourg:
Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol. CAV 1999: 96-107 - Armin Biere, Edmund M. Clarke, Richard Raimi, Yunshan Zhu:
Verifiying Safety Properties of a Power PC Microprocessor Using Symbolic Model Checking without BDDs. CAV 1999: 60-71 - Per Bjesse:
Automatic Verification of Combinatorial and Pipelined FFT. CAV 1999: 380-393 - Roderick Bloem, Kavita Ravi, Fabio Somenzi:
Efficient Decision Procedures for Model Checking of Linear Time Logic Properties. CAV 1999: 222-235 - Vamsi Boppana, Sreeranga P. Rajan, Koichiro Takayama, Masahiro Fujita:
Model Checking Based on Sequential ATPG. CAV 1999: 418-430 - Marius Bozga, Oded Maler:
On the Representation of Probabilities over Structured Domains. CAV 1999: 261-273 - Ed Brinksma:
Formal Methods for Conformance Testing: Theory Can Be Practical. CAV 1999: 44-45 - Glenn Bruns, Patrice Godefroid:
Model Checking Partial State Spaces with 3-Valued Temporal Logics. CAV 1999: 274-287 - Randal E. Bryant, Steven M. German, Miroslav N. Velev:
Exploiting Positive Equality in a Logic of Equality with Uninterpreted Functions. CAV 1999: 470-482 - Peter Buchholz, Peter Kemper:
A Toolbox for the Analysis of Discrete Event Dynamic Systems. CAV 1999: 483-486 - Luca P. Carloni, Kenneth L. McMillan, Alberto L. Sangiovanni-Vincentelli:
Latency Insensitive Protocols. CAV 1999: 123-133 - Ching-Tsun Chou:
The Mathematical Foundation fo Symbolic Trajectory Evaluation. CAV 1999: 196-207 - Alessandro Cimatti, Edmund M. Clarke, Fausto Giunchiglia, Marco Roveri:
NUSMV: A New Symbolic Model Verifier. CAV 1999: 495-499 - Marco Daniele, Fausto Giunchiglia, Moshe Y. Vardi:
Improved Automata Generation for Linear Temporal Logic. CAV 1999: 249-260 - Satyaki Das, David L. Dill, Seungjoon Park:
Experience with Predicate Abstraction. CAV 1999: 160-171 - David L. Dill:
Alternative Approaches to Hardware Verification (abstract). CAV 1999: 1 - Kousha Etessami:
Stutter-Invariant Languages, omega-Automata, and Temporal Logic. CAV 1999: 236-248 - Marcelo Glusman, Shmuel Katz:
Mechanizing Proofs of Computation Equivalence. CAV 1999: 354-367 - Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajamani:
Assume-Guarantee Refinement Between Different Time Scales. CAV 1999: 208-221 - Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajamani:
Verifying Sequential Consistency on Shared-Memory Multiprocessor Systems. CAV 1999: 301-315 - Holger Hermanns, Vassilis Mertsiotakis, Markus Siegle:
TIPPtool: Compositional Specification and Analysis of Markovian Performance Models. CAV 1999: 487-490 - Thierry Jéron, Pierre Morel:
Test Generation Derived from Model-Checking. CAV 1999: 108-121 - Nils Klarlund:
A Theory of Restrictions for Logics and Automata. CAV 1999: 406-417 - Orna Kupferman, Moshe Y. Vardi:
Model Checking of Safety Properties. CAV 1999: 172-183
skipping 14 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 07:28 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint