共 50 条
- [31] A verification logic for security protocols based on computational semantics Tang, Chao-Jing, 1600, Chinese Institute of Electronics (42):
- [32] VERILAT: Verification using logic augmentation and transformations 1996 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN - DIGEST OF TECHNICAL PAPERS, 1996, : 88 - 95
- [33] Automatic validation of transformation rules for Java']Java verification against a rewriting semantics LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, PROCEEDINGS, 2005, 3835 : 412 - 426
- [35] Survey of Graph Rewriting applied to Model Transformations PROCEEDINGS OF THE 2014 2ND INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD 2014), 2014, : 431 - 441
- [36] Real-Time Rewriting Logic Semantics for Spatial Concurrent Constraint Programming REWRITING LOGIC AND ITS APPLICATIONS, WRLA 2018, 2018, 11152 : 226 - 244
- [37] Maude action tool: Using reflection to map action semantics to rewriting logic ALGEBRAIC METHODOLOGY AND SOFTWARE TECHNOLOGY, PROCEEDINGS, 2000, 1816 : 407 - 421
- [38] Verification of complex real-time systems using rewriting logic J. Compt. Inf. Technol., 2009, 3 (265-284):
- [39] Verification of parameterized systems using logic program transformations TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2000, 1785 : 172 - 187
- [40] On the Specification and Verification of Model Transformations SEMANTICS AND ALGEBRAIC SPECIFICATION: ESSAYS DEDICATED TO PETER D. MOSSES ON THE OCCASION OF HIS 60TH BIRTHDAY, 2009, 5700 : 140 - +