Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
32
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,246
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Verified Software: Theories, Tools, Experiments
other
Editor(s):
Rajeev Joshi
,
Peter Müller
,
Andreas Podelski
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
REPO4EU WP2 Tools
Author and book information
Book
ISBN (Print):
978-3-642-27704-7
ISBN (Electronic):
978-3-642-27705-4
Publication date (Print):
2012
DOI:
10.1007/978-3-642-27705-4
SO-VID:
51b6bea2-9c1d-4fec-965a-c5a2dcc9c8ea
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 18
Integrated Semantics of Intermediate-Language C and Macro-Assembler for Pervasive Formal Verification of Operating Systems and Hypervisors from VerisoftXT
pp. 146
LLBMC: Bounded Model Checking of C and C++ Programs Using a Compiler IR
pp. 261
Termination Analysis of Imperative Programs Using Bitvector Arithmetic
Similar content
2,246
Verified microcode design
Authors:
David Shepherd
Verifiable Multi-Dimensional (t,n) Threshold Quantum Secret Sharing Based on Quantum Walk
Authors:
Yu Wang
,
Xiaoping Lou
,
Zhou Fan
…
Selective predation by the carnivorous marine copepodEuchaeta elongata: Laboratory measurements of predation rates verified by field observations of temporal and spatial feeding patterns1,2
Authors:
J. Yen
See all similar
Cited by
2
Formal Methods and CyberSecurity
Authors:
James H. Davenport
A Tutorial on Using Dafny to Construct Verified Software
Authors:
Paqui Lucio
See all cited by