Formal Verification of Unsatisfiability Results

被引:0
|
作者
Heule, Marijn J. H. [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
引用
收藏
页码:2 / 2
页数:1
相关论文
共 50 条
  • [21] Formal verification: Prove it or pitch it
    Pixley, C
    Carballo, JA
    IEEE DESIGN & TEST OF COMPUTERS, 2003, 20 (04): : 86 - 88
  • [22] Formal Verification for Components and Connectors
    Baier, Christel
    Blechmann, Tobias
    Klein, Joachim
    Klueppelholz, Sascha
    FORMAL METHODS FOR COMPONENTS AND OBJECTS, 2009, 5751 : 82 - 101
  • [23] Formal Verification of Liferay RBAC
    Calzavara, Stefano
    Rabitti, Alvise
    Bugliesi, Michele
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 1 - 16
  • [24] FORMAL VERIFICATION OF A PIPELINED MICROPROCESSOR
    SRIVAS, M
    BICKFORD, M
    IEEE SOFTWARE, 1990, 7 (05) : 52 - 64
  • [25] Coverage metrics for formal verification
    Chockler, H
    Kupferman, O
    Vardi, MY
    CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 111 - 125
  • [26] Design and Formal Verification of DZMBE
    Mohammadi, Mahdi Soodkhah
    Bafghi, Abbas Ghaemi
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (01): : 37 - 53
  • [27] Formal Verification of Concurrency in Go
    Prasertsang, Anuchit
    Pradubsuwun, Denduang
    2016 13TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2016, : 258 - 261
  • [28] Formal verification of firewall policies
    Liu, Alex X.
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1494 - 1498
  • [29] Exploiting Refactoring in Formal Verification
    Yin, Xiang
    Knight, John
    Weimer, Westley
    2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 53 - 62
  • [30] Formal Verification Successes at Motorola
    Magdy S. Abadir
    Kenneth L. Albin
    John Havlicek
    Narayanan Krishnamurthy
    Andrew K. Martin
    Formal Methods in System Design, 2003, 22 : 117 - 123