![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
19th MEMOCODE 2021: Virtual Event, China
- S. Arun-Kumar, Dominique Méry, Indranil Saha, Lijun Zhang:
MEMOCODE '21: 19th ACM-IEEE International Conference on Formal Methods and Models for System Design, Virtual Event, China, November 20 - 22, 2021. ACM 2021, ISBN 978-1-4503-9127-6 - Mohammed Barhoush, Alireza Mahzoon, Rolf Drechsler
:
Polynomial word-level verification of arithmetic circuits. 1-9 - Ignacio D. Lopez-Miguel
, Borja Fernández Adiego, Jean-Charles Tournier, Enrique Blanco Viñuela, Juan A. Rodríguez-Aguilar
:
Simplification of numeric variables for PLC model checking. 10-20 - Khalil Esper, Stefan Wildermann, Jürgen Teich:
Enforcement FSMs: specification and verification of non-functional properties of program executions on MPSoCs. 21-31 - Dominik Walter, Jürgen Teich:
LION: real-time I/O transfer control for massively parallel processor arrays. 32-43 - Mathis Niehage, Arnd Hartmanns, Anne Remke:
Learning optimal decisions for stochastic hybrid systems. 44-55 - Abhinandan Panda, Srinivas Pinisetty, Partha S. Roop:
A secure insulin infusion system using verification monitors. 56-65 - Klaus Schneider:
Translating structured sequential programs to dataflow graphs. 66-77 - Ennio Visconti, Ezio Bartocci
, Michele Loreti, Laura Nenzi:
Online monitoring of spatio-temporal properties for imprecise signals. 78-88 - Shenghao Yuan
, Jean-Pierre Talpin:
Verified functional programming of an IoT operating system's bootloader. 89-97 - Felix Freiberger
, Stefan Schupp, Holger Hermanns
, Erika Ábrahám
:
Controller verification meets controller code: a case study. 98-103 - Marcel Christian Werner, Klaus Schneider:
Translation of continuous function charts to imperative synchronous quartz programs. 104-110 - Adam Petz, Grant Jurgensen, Perry Alexander:
Design and formal verification of a copland-based attestation protocol. 111-117 - Nicolas Basset, Thao Dang, Felix Gigler
, Cristinel Mateis
, Dejan Nickovic
:
Sampling of shape expressions with ShapEx. 118-125 - Farhaan Fowze, Tuba Yavuz:
SEESAW: a tool for detecting memory vulnerabilities in protocol stack implementations. 126-133 - Kelvin Anto
, Partha S. Roop, Akshya K. Swain:
Formal modelling of attack scenarios and mitigation strategies in IEEE 1588. 134-141
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.