Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
39
views
30
references
Top references
cited by
7
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,358
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Formal Methods and Software Engineering
Verifying a File System Implementation
other
Author(s):
Konstantine Arkoudas
,
Karen Zee
,
Viktor Kuncak
,
Martin Rinard
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
REPO4EU WP2 Databases
Most cited references
30
Record
: found
Abstract
: not found
Book
: not found
Isabelle/HOL
Tobias Nipkow
,
Markus Wenzel
,
Lawrence Paulson
(2002)
0
comments
Cited
199
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Parametric shape analysis via 3-valued logic
Mooly Sagiv
,
Thomas Reps
,
Reinhard Wilhelm
(2002)
0
comments
Cited
107
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Alloy: a lightweight object modelling notation
Daniel Jackson
(2002)
0
comments
Cited
63
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2004
Pages
: 373-390
DOI:
10.1007/978-3-540-30482-1_32
SO-VID:
a3610233-f626-499d-abed-25c57f093d99
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 15
Multi-prover Verification of C Programs
pp. 131
Deriving Probabilistic Semantics Via the ‘Weakest Completion’
pp. 162
An Equational Calculus for Alloy
pp. 194
Linear Inequality LTL (iLTL): A Model Checker for Discrete Time Markov Chains
pp. 30
Memory-Model-Sensitive Data Race Analysis
pp. 357
A Formal Monitoring-Based Framework for Software Development and Analysis
pp. 373
Verifying a File System Implementation
Similar content
2,358
Verified microcode design
Authors:
David Shepherd
Verifiable Multi-Dimensional (t,n) Threshold Quantum Secret Sharing Based on Quantum Walk
Authors:
Yu Wang
,
Xiaoping Lou
,
Zhou Fan
…
Selective predation by the carnivorous marine copepodEuchaeta elongata: Laboratory measurements of predation rates verified by field observations of temporal and spatial feeding patterns1,2
Authors:
J. Yen
See all similar
Cited by
7
Deciding Boolean Algebra with Presburger Arithmetic
Authors:
Viktor Kuncak
,
Huu Hai Nguyen
,
Martin C Rinard
An Algorithm for Deciding BAPA: Boolean Algebra with Presburger Arithmetic
Authors:
Viktor Kuncak
,
Huu Hai Nguyen
,
Martin C Rinard
Verifying a File System Implementation
Authors:
Konstantine Arkoudas
,
Karen Zee
,
Viktor Kuncak
…
See all cited by