Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
68
views
0
references
Top references
cited by
14
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,340
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Computer Aided Verification
other
Editor(s):
Armin Biere
,
Roderick Bloem
Publication date
(Print):
2014
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and book information
Book
ISBN (Print):
978-3-319-08866-2
ISBN (Electronic):
978-3-319-08867-9
Publication date (Print):
2014
DOI:
10.1007/978-3-319-08867-9
SO-VID:
8d00e438-2bab-4e2f-a6c5-48683b78d636
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 17
SMT-Based Model Checking for Recursive Programs
pp. 491
Optimal Guard Synthesis for Memory Safety
pp. 35
Property-Directed Shape Analysis
pp. 52
Shape Analysis via Second-Order Bi-Abduction
pp. 69
ICE: A Robust Framework for Learning Invariants
pp. 88
From Invariant Checking to Invariant Inference Using Randomized Search
pp. 106
SMACK: Decoupling Source Language Details from Verifier Implementations
pp. 114
Synthesis of Masking Countermeasures against Side Channel Attacks
pp. 150
String Constraints for Verification
pp. 192
From LTL to Deterministic Automata: A Safraless Compositional Approach
pp. 646
A DPLL(T) Theory Solver for a Theory of Strings and Regular Expressions
pp. 680
A Tale of Two Solvers: Eager and Lazy Approaches to Bit-Vectors
pp. 696
AVATAR: The Architecture for First-Order Theorem Provers
pp. 711
Automating Separation Logic with Trees and Data
pp. 737
Yices 2.2
pp. 745
A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis
pp. 762
Symbolic Resource Bound Inference for Functional Programs
pp. 779
Proving Non-termination Using Max-SMT
Similar content
2,340
Blockchain-enabled verification of medical records using soul-bound tokens and cloud computing
Authors:
Puneeta Singh
,
Shrddha Sagar
,
Sofia Singh
…
Strategy Selection for Software Verification Based on Boolean Features
Authors:
Dirk Beyer
,
Matthias Dangl
Second International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2008) - Index
Authors:
Rahma Ben Ayed
,
Suzanne Keene
See all similar
Cited by
14
Developing a Practical Reactive Synthesis Tool: Experience and Lessons Learned
Authors:
Leonid Ryzhyk
,
Adam Walker
Static Analysis Using the Cloud
Authors:
Rahul Kumar
,
Chetan Bansal
,
Jakob Lichtenberg
Compositional Verification of Heap-Manipulating Programs through Property-Guided Learning
Authors:
Long H. Pham
,
Jun Sun
,
Quang Loc Le
See all cited by