Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 44 matches
- 2014
- Matteo Avalle, Alfredo Pironti, Riccardo Sisto:
Formal verification of security protocol implementations: a survey. Formal Aspects Comput. 26(1): 99-123 (2014) - Richard Banach, Huibiao Zhu, Wen Su, Runlei Huang:
Continuous KAOS, ASM, and formal control system design across the continuous/discrete modeling interface: a simple train stopping application. Formal Aspects Comput. 26(2): 319-366 (2014) - Michael J. Banks, Jeremy L. Jacob:
On integrating confidentiality and functionality in a formal method. Formal Aspects Comput. 26(5): 963-992 (2014) - Giampaolo Bella:
Inductive study of confidentiality: for everyone. Formal Aspects Comput. 26(1): 3-36 (2014) - Eerke A. Boiten:
Introducing extra operations in refinement. Formal Aspects Comput. 26(2): 305-317 (2014) - Eerke A. Boiten, John Derrick, Steve Reeves:
Editorial. Formal Aspects Comput. 26(2): 195 (2014) - Eerke A. Boiten, Steve A. Schneider:
Editorial. Formal Aspects Comput. 26(1): 1-2 (2014) - Pontus Boström, Fredrik Degerlund, Kaisa Sere, Marina Waldén:
Derivation of concurrent programs by stepwise scheduling of Event-B models. Formal Aspects Comput. 26(2): 281-303 (2014) - Stephen Brookes, Peter W. O'Hearn, Uday S. Reddy:
The Essence of Reynolds. Formal Aspects Comput. 26(3): 435-439 (2014) - Muffy Calder, Michele Sevegnani:
Modelling IEEE 802.11 CSMA/CA RTS/CTS with stochastic bigraphs with sharing. Formal Aspects Comput. 26(3): 537-561 (2014) - Ana Cavalcanti, Steve King, Colin O'Halloran, Jim Woodcock:
Test-data generation for control coverage by proof. Formal Aspects Comput. 26(4): 795-823 (2014) - Krishnendu Chatterjee, Vishwanath Raman:
Assume-guarantee synthesis for digital contract signing. Formal Aspects Comput. 26(4): 825-859 (2014) - Robert Colvin:
An operational semantics for object-oriented concepts based on the class hierarchy. Formal Aspects Comput. 26(3): 491-535 (2014) - Luís Cruz-Filipe, Ivan Lanese, Francisco Martins, António Ravara, Vasco Thudichum Vasconcelos:
The stream-based service-centred calculus: a foundation for service-oriented programming. Formal Aspects Comput. 26(5): 865-918 (2014) - Ferruccio Damiani, Johan Dovland, Einar Broch Johnsen, Ina Schaefer:
Verifying traits: an incremental proof system for fine-grained reuse. Formal Aspects Comput. 26(4): 761-793 (2014) - Matthias Daum, Nelson Billing, Gerwin Klein:
Concerned with the unprivileged: user programs in kernel refinement. Formal Aspects Comput. 26(6): 1205-1229 (2014) - John Derrick, Eerke A. Boiten:
Relational concurrent refinement part III: traces, partial relations and automata. Formal Aspects Comput. 26(2): 407-432 (2014) - Manoj G. Dixit, S. Ramesh, Pallab Dasgupta:
Time-budgeting: a component based development methodology for real-time embedded systems. Formal Aspects Comput. 26(3): 591-621 (2014) - Jin Song Dong, Yang Liu, Jun Sun, Xian Zhang:
Towards verification of computation orchestration. Formal Aspects Comput. 26(4): 729-759 (2014) - Brijesh Dongol, Ian J. Hayes, Peter J. Robinson:
Reasoning about goal-directed real-time teleo-reactive programs. Formal Aspects Comput. 26(3): 563-589 (2014) - Marc Frappier, Frédéric Gervais, Régine Laleau, Jérémy Milhau:
Refinement patterns for ASTDs. Formal Aspects Comput. 26(5): 919-941 (2014) - Canan Güniçen, Kemal Inan, Uraz Cengiz Türker, Hüsnü Yenigün:
The relation between preset distinguishing sequences and synchronizing sequences. Formal Aspects Comput. 26(6): 1153-1167 (2014) - James Heather, Steve A. Schneider, Vanessa Teague:
Cryptographic protocols with everyday objects. Formal Aspects Comput. 26(1): 37-62 (2014) - Thai Son Hoang, A. K. McIver, Larissa Meinicke, Carroll C. Morgan, Anthony Sloane, E. Susatyo:
Abstractions of non-interference security: probabilistic versus possibilistic. Formal Aspects Comput. 26(1): 169-194 (2014) - Cliff B. Jones:
Editorial. Formal Aspects Comput. 26(3): 433 (2014) - Cliff B. Jones:
Editorial. Formal Aspects Comput. 26(5): 861 (2014) - Savas Konur, Michael Fisher, Simon Dobson, Stephen Knox:
Formal verification of a pervasive messaging system. Formal Aspects Comput. 26(4): 677-694 (2014) - Xi Liu, Shaofa Yang, Jeff W. Sanders:
Compensation by design. Formal Aspects Comput. 26(4): 623-676 (2014) - Maria Teresa Llano, Andrew Ireland, Alison Pease:
Discovery of invariants through automated theory formation. Formal Aspects Comput. 26(2): 203-249 (2014) - Alvaro Miyazawa, Ana Cavalcanti:
Refinement-based verification of implementations of Stateflow charts. Formal Aspects Comput. 26(2): 367-405 (2014)
skipping 14 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-28 13:23 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint