Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
16
views
12
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,186
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications
The Guided System Development Framework: Modeling and Verifying Communication Systems
other
Author(s):
Jose Quaresma
,
Christian W. Probst
,
Flemming Nielson
Publication date
(Print):
2014
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Open source discrete and agent-based modeling frameworks for biology
Most cited references
12
Record
: found
Abstract
: not found
Article
: not found
A logic of authentication
Michael P Burrows
,
Martín Abadi
,
Roger Needham
(1990)
0
comments
Cited
240
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Structured Communication-Centred Programming for Web Services
Marco Carbone
,
Kohei Honda
,
Nobuko Yoshida
(2007)
0
comments
Cited
34
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A Computationally Sound Mechanized Prover for Security Protocols
B Blanchet
(2008)
0
comments
Cited
12
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 509-523
DOI:
10.1007/978-3-662-45231-8_42
SO-VID:
5bbe8242-12d8-4862-b43c-1eff8ecfed84
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Introduction to Track on Engineering Virtualized Services
pp. 5
Erlang-Style Error Recovery for Concurrent Objects with Cooperative Scheduling
pp. 22
Fault Model Design Space for Cooperative Concurrency
pp. 37
Programming with Actors in Java 8
pp. 54
Contracts in CML
pp. 74
Distributed Energy Management Case Study: A Formal Approach to Analyzing Utility Functions
pp. 88
Towards the Typing of Resource Deployment
pp. 104
Static Inference of Transmission Data Sizes in Distributed Systems
pp. 120
Fully Abstract Operation Contracts
pp. 135
Statistical Model Checking Past, Present, and Future
pp. 143
An Effective Heuristic for Adaptive Importance Splitting in Statistical Model Checking
pp. 160
A Formalism for Stochastic Adaptive Systems
pp. 177
A Review of Statistical Model Checking Pitfalls on Real-Time Stochastic Models
pp. 193
Formal Analysis of the Wnt/β-catenin through Statistical Model Checking
pp. 208
Battery-Aware Scheduling of Mixed Criticality Systems
pp. 223
Using Statistical Model Checking for Measuring Systems
pp. 239
Blocking Advertisements on Android Devices Using Monitoring Techniques
pp. 254
Monitoring with Data Automata
pp. 274
Risk-Based Testing
pp. 277
A Technique for Risk-Based Test Procedure Identification, Prioritization and Selection
pp. 292
A Risk Assessment Framework for Software Testing
pp. 309
Data Driven Testing of Open Source Software
pp. 322
Combining Risk Analysis and Security Testing
pp. 337
Risk-Based Vulnerability Testing Using Security Test Patterns
pp. 353
Medical Cyber-Physical Systems
pp. 356
Compositional, Approximate, and Quantitative Reasoning for Medical Cyber-Physical Systems with Application to Patient-Specific Cardiac Dynamics and Devices
pp. 365
On Quantitative Software Quality Assurance Methodologies for Cardiac Pacemakers
pp. 385
Model Checking Hybrid Systems
pp. 387
Challenges for the Dynamic Interconnection of Medical Devices
pp. 391
Temporal Logic Based Monitoring of Assisted Ventilation in Intensive Care Patients
pp. 404
Track Introduction: Scientific Workflows
pp. 407
Meta-analysis of Disjoint Sets of Attributes in Large Cohort Studies
pp. 420
Towards a Flexible Assessment of Climate Impacts: The Example of Agile Workflows for the ci:grasp Platform
pp. 436
A Visual Programming Approach to Beat-Driven Humanoid Robot Dancing
pp. 449
jABCstats: An Extensible Process Library for the Empirical Analysis of jABC Workflows
pp. 464
Automatic Annotation of Bioinformatics Workflows with Biomedical Ontologies
pp. 479
Evaluation and Reproducibility of Program Analysis (Track Introduction)
pp. 482
SWEET – A Tool for WCET Flow Analysis (Extended Abstract)
pp. 486
Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities II
pp. 489
Construction of Abstract Domains for Heterogeneous Properties (Position Paper)
pp. 493
Verification of Polyhedral Optimizations with Constant Loop Bounds in Finite State Space Computations
pp. 509
The Guided System Development Framework: Modeling and Verifying Communication Systems
pp. 524
Processes and Data Integration in the Networked Healthcare
pp. 526
Simple Management of High Assurance Data in Long-Lived Interdisciplinary Healthcare Research: A Proposal
pp. 545
Domain-Specific Business Modeling with the Business Model Developer
pp. 561
Dr. Watson? Balancing Automation and Human Expertise in Healthcare Delivery
pp. 570
Semantic Heterogeneity in the Formal Development of Complex Systems: An Introduction
pp. 573
Modelling and Verifying an Evolving Distributed Control System Using an Event-Based Approach
pp. 588
Requirements Driven Data Warehouse Design: We Can Go Further
pp. 604
On Implicit and Explicit Semantics: Integration Issues in Proof-Based Development of Systems
Similar content
4,186
New DoS Defense Method Based on Strong Designated Verifier Signatures
Authors:
Marcone de Almeida
,
Rafael Timóteo de Sousa Junior
,
Luis Javier García Villalba
…
Experimentally Verified Numerical Optimization of a Three-Dimensional Parametrized Turbine Vane With Nonaxisymmetric End Walls
Authors:
Marc G. Nagel
,
Ralf-D. Baier
Identity based on-line/off-line signature with designated verifier
Authors:
Y Jiang
See all similar
Cited by
1
Evaluation and Reproducibility of Program Analysis (Track Introduction)
Authors:
Markus Schordan
,
Welf Löwe
,
Dirk Beyer
See all cited by