default search action
Formal Methods in System Design, Volume 51
Volume 51, Number 1, August 2017
- Ezio Bartocci, Rupak Majumdar:
Introduction to the special issue on runtime verification. 1-4 - Jyotirmoy V. Deshmukh, Alexandre Donzé, Shromona Ghosh, Xiaoqing Jin, Garvit Juniwal, Sanjit A. Seshia:
Robust online monitoring of signal temporal logic. 5-30 - Patrick Moosbrugger, Kristin Y. Rozier, Johann Schumann:
R2U2: monitoring and diagnosis of security threats for unmanned aerial systems. 31-61 - Dung T. Phan, Junxing Yang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Collision avoidance for mobile robots with limited sensing and limited information about moving obstacles. 62-86 - Adrian Francalanza, Luca Aceto, Anna Ingólfsdóttir:
Monitorability for the Hennessy-Milner logic with recursion. 87-116 - Ali Kassem, Yliès Falcone, Pascal Lafourcade:
Formal analysis and offline monitoring of electronic exams. 117-153 - Srinivas Pinisetty, Viorel Preoteasa, Stavros Tripakis, Thierry Jéron, Yliès Falcone, Hervé Marchand:
Predictive runtime enforcement. 154-199 - Wolfgang Ahrendt, Jesús Mauricio Chimento, Gordon J. Pace, Gerardo Schneider:
Verifying data- and control-oriented properties combining static and runtime verification: theory and tools. 200-265
Volume 51, Number 2, November 2017
- Georg Gottlob, Thomas A. Henzinger, Georg Weissenbacher:
Preface of the Special Issue in Memoriam Helmut Veith. 267-269 - Igor Konnov, Marijana Lazic, Helmut Veith, Josef Widder:
Para2: parameterized path reduction, acceleration, and SMT for reachability in threshold-guarded distributed algorithms. 270-307 - Niklas Büscher, Martin Franz, Andreas Holzer, Helmut Veith, Stefan Katzenbeisser:
On compiling Boolean circuits optimized for secure multi-party computation. 308-331 - Bettina Könighofer, Mohammed Alshiekh, Roderick Bloem, Laura R. Humphrey, Robert Könighofer, Ufuk Topcu, Chao Wang:
Shield synthesis. 332-361 - William R. Harris, Somesh Jha, Thomas W. Reps, Sanjit A. Seshia:
Program synthesis for interactive-security systems. 362-394 - Frederic Doucet, Robert P. Kurshan:
A methodology to take credit for high-level verification during RTL verification. 395-418 - Johann A. Makowsky, Anna Zamansky:
Keeping logic in the trivium of computer science: a teaching perspective. 419-430
Volume 51, Number 3, December 2017
- Alberto Griggio, Philipp Rümmer:
Preface to special issue on satisfiability modulo theories. 431-432 - Martin Bromberger, Christoph Weidenbach:
New techniques for linear arithmetic: cubes and equalities. 433-461 - Vu Xuan Tung, To Van Khanh, Mizuhito Ogawa:
raSAT: an SMT solver for polynomial constraints. 462-499 - Andrew Reynolds, Tim King, Viktor Kuncak:
Solving quantified linear arithmetic by counterexample-guided instantiation. 500-532 - Andreas Fellner, Pascal Fontaine, Bruno Woltzenlogel Paleo:
NP-completeness of small conflict set generation for congruence closure. 533-544 - Francesco Alberti, Silvio Ghilardi, Elena Pagani:
Cardinality constraints for arrays (decidability results and applications). 545-574 - Constantin Enea, Ondrej Lengál, Mihaela Sighireanu, Tomás Vojnar:
Compositional entailment checking for a fragment of separation logic. 575-607 - Aina Niemetz, Mathias Preiner, Armin Biere:
Propagation based local search for bit-precise reasoning. 608-636
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.