Login / Signup
Verifying Compliance of Trusted Programs.
Sandra Julieta Rueda
Dave King
Trent Jaeger
Published in:
USENIX Security Symposium (2008)
Keyphrases
</>
distributed environment
model checking
learning algorithm
computer programs
intermediate level
neural network
real world
information retrieval
image processing
provably correct
prolog programs