Sign in
Trustworthy Software
2006
2006
2006
Keyphrases
Publications
2006
Jan Reineke
Shape Analysis of Sets.
Trustworthy Software
(2006)
Michael Hilker
,
Christoph Schommer
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems.
Trustworthy Software
(2006)
Serge Autexier
,
Stephan Merz
,
Leendert W. N. van der Torre
,
Reinhard Wilhelm
,
Pierre Wolper
Preface -- Workshop Trustworthy Software 2006.
Trustworthy Software
(2006)
Stephan Neuhaus
Isolating Intrusions by Automatic Experiments.
Trustworthy Software
(2006)
Björn Wachter
Explaining Data Type Reduction in the Shape Analysis Framework.
Trustworthy Software
(2006)
Ina Schaefer
,
Arnd Poetzsch-Heffter
Using Abstraction in Modular Verification of Synchronous Adaptive Systems.
Trustworthy Software
(2006)
Axel Legay
,
Luca de Alfaro
,
Marco Faella
An Introduction to the Tool Ticc.
Trustworthy Software
(2006)
Arnaud Lanoix
,
Dieu Donné Okalas Ossami
,
Jeanine Souquières
An Operator-based Approach to Incremental Development of Conform Protocol State Machines.
Trustworthy Software
(2006)
Claude Kirchner
,
Pierre-Etienne Moreau
,
Antoine Reilles
Formal Validation of Pattern Matching code.
Trustworthy Software
(2006)
Eugen Zalinescu
,
Véronique Cortier
,
Michaël Rusinowitch
Relating two standard notions of secrecy.
Trustworthy Software
(2006)
Julien Schmaltz
,
Dominique Borrione
Formalizing On Chip Communications in a Functional Style.
Trustworthy Software
(2006)
volume 3, 2006
Workshop "Trustworthy Software" 2006, May 18-19, 2006, Saarland University, Saarbrücken, Germany
Trustworthy Software
3 (2006)