Search Results - "formal methods"
Suggested Topics within your search.
Suggested Topics within your search.
- Software Engineering 23
- Computer science 22
- Artificial intelligence 21
- Systems analysis & design 12
- Mathematical theory of computation 10
- Algorithms & data structures 8
- Computer architecture & logic design 8
- Computer networking & communications 8
- Computer modelling & simulation 6
- Computer programming / software development 6
- Software testing & verification 6
- Software engineering 5
- Computer Engineering and Networks 4
- Computer engineering 4
- Computer networks 4
- Artificial Intelligence 3
- Philosophy 3
- Coding theory & cryptology 2
- Computer Modelling 2
- Computer simulation 2
- Computing & information technology 2
- Electronic data processing 2
- Expert systems / knowledge-based systems 2
- History of engineering & technology 2
- Humanities 2
- IT Operations 2
- Information technology industries 2
- Literary studies: fiction, novelists & prose writers 2
- Literary theory 2
- Management 2
-
41
-
42
-
43
Computer Aided Verification 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I /
Published 2022Table of Contents: “…A Billion SMT Queries a Day -- Program Verification with Constrained Horn Clauses -- Formal Methods for Probabilistic Programs Data-Driven Invariant Learning for Probabilistic Programs -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs.…”
Link to Metadata
Electronic eBook -
44
Computer Aided Verification 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part II /
Published 2022Table of Contents: “…A Billion SMT Queries a Day -- Program Verification with Constrained Horn Clauses -- Formal Methods for Probabilistic Programs Data-Driven Invariant Learning for Probabilistic Programs -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs.…”
Link to Metadata
Electronic eBook -
45
-
46
-
47
The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? /
Published 2018Table of Contents: “…-- 4 Development of ICT Systems -- 5 Theoretical Foundation -- 6 Reverse Engineering of Code -- 7 Static Detection of Malware -- 8 Dynamic Detection Methods -- 9 Formal Methods -- 10 Software Quality and Quality Management -- 11 Containment of Untrusted Modules -- 12 Summary and Way Forward.…”
Link to Metadata
Electronic eBook -
48
التحقق من البروتوكولات الأمنية باستخدام الطرق الرسمية
Published 2018Connect to this object online.
Book -
49
-
50
-
51
-
52
Factory Automation
Published 2010DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
53
Course notes on finite games and rational choice
Published 2018DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
54
Linguistics as a Science
Published 1986DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
55
Course notes on finite games and rational choice
Published 2018OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
56
Current Trends in New Testament Study
Published 2020DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
57
Character Constellations Representations of Social Groups in Present-Day Dutch Literary Fiction
Published 2021DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
58
Mathematics in Software Reliability and Quality Assurance
Published 2022DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
59
-
60