共 21 条
- [1] A Novel Verifying System of USB2.0 IP Core for SoC Applications [J]. 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II, 2009, : 1010 - 1013
- [3] Emulation Based High-Accuracy Throughput Estimation for High-Speed Connectivities: Case Study of USB2.0 [J]. PROCEEDINGS OF THE 48TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2011, : 609 - 614
- [4] Verifying OSEK/VDX Applications: An Optimized SMT-based Bounded Model Checking Approach [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 615 - 620
- [6] Verifying Multi-threaded Software using SMT-based Context-Bounded Model Checking [J]. 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2011, : 331 - 340
- [7] Verifying Real-Time Properties of Multi-agent Systems via SMT-Based Bounded Model Checking [J]. PRIMA 2016: PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS, 2016, 9862 : 149 - 167
- [8] Bounded model checking of concurrent data types on relaxed memory models: A case study [J]. COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2006, 4144 : 489 - 502
- [9] A Method of Virtual Test Based on Model Checking and a Case Study [J]. PROCEEDINGS OF 2016 CHINESE INTELLIGENT SYSTEMS CONFERENCE, VOL I, 2016, 404 : 437 - 453
- [10] Case Study: Discovering Hardware Trojans Based on model checking [J]. ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 64 - 68