Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
63
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,369
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Computer Aided Verification
other
Editor(s):
Ed Brinksma
,
Kim Guldstrand Larsen
Publication date
(Online):
September 20 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and book information
Book
ISBN (Print):
978-3-540-43997-4
ISBN (Electronic):
978-3-540-45657-5
Publication date (Print):
2002
Publication date (Online):
September 20 2002
DOI:
10.1007/3-540-45657-0
SO-VID:
5e4e2c13-00e2-4891-9103-c53983029899
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 65
Symbolic Localization Reduction with Reconstruction Layering and Backtracking
pp. 17
The Quest for Efficient Boolean Satisfiability Solvers
pp. 58
Infinite Games and Verification
pp. 78
Modeling and Verifying Systems Using a Logic of Counter Arithmetic with Lambda Expressions and Uninterpreted Functions
pp. 107
Liveness with (0,1, ∞)- Counter Abstraction
pp. 209
Deciding Separation Formulas with SAT
pp. 223
Probabilistic Verification of Discrete Event Systems Using Acceptance Sampling
pp. 236
Checking Satisfiability of First-Order Formulas by Incremental Translation to SAT
pp. 265
SAT Based Abstraction-Refinement Using ILP and Machine Learning Techniques
pp. 349
The AVISS Security Protocol Analysis Tool
pp. 365
The d/dt Tool for Verification of Hybrid Systems
pp. 414
Synchronous and Bidirectional Component Interfaces
pp. 428
Interface Compatibility Checking for Software Modules
pp. 442
Practical Methods for Proving Program Termination
pp. 485
Vacuum Cleaning CTL Formulae
pp. 500
CVC: A Cooperating Validity Checker
pp. 526
Temporal-Safety Proofs for Systems Code
pp. 539
Extrapolating Tree Transformations
pp. 555
Regular Tree Model Checking
pp. 610
Fair Simulation Minimization
Similar content
1,369
State-of-the-art authentication and verification schemes in VANETs: A survey
Authors:
Sheraz Mazhar
,
Abdur Rakib
,
Lei Pan
…
Runtime verification of hyperproperties for deterministic programs
Authors:
Srinivas Pinisetty
,
Gerardo Schneider
,
David Sands
Blockchain-enabled verification of medical records using soul-bound tokens and cloud computing
Authors:
Puneeta Singh
,
Shrddha Sagar
,
Sofia Singh
…
See all similar
Cited by
2
A New Rule for LTL Tableaux
Authors:
Mark Reynolds
Bounded Model Checking of Max-Plus Linear Systems via Predicate Abstractions
Authors:
Muhammad Mufid
,
Dieky Adzkiya
,
Alessandro Abate
See all cited by