Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
16
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,317
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Formal Methods
SDN-Actors: Modeling and Verification of SDN Programs
other
Author(s):
Elvira Albert
,
Miguel Gómez-Zamalloa
,
Albert Rubio
,
Matteo Sammartino
,
Alexandra Silva
Publication date
(Online):
July 12 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Reviews of mathematical modeling in cancer
Most cited references
16
Record
: found
Abstract
: not found
Book Chapter
: not found
ABS: A Core Language for Abstract Behavioral Specification
Einar Johnsen
,
Reiner Hähnle
,
Jan Schäfer
…
(2012)
0
comments
Cited
43
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Complete Guide to the Future
Frank de Boer
,
Dave Clarke
,
Einar Johnsen
(2007)
0
comments
Cited
38
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
VeriCon: towards verifying controller programs in software-defined networks
Thomas Ball
,
Nikolaj Bjørner
,
Aaron Gember
…
(2014)
0
comments
Cited
9
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
July 12 2018
Pages
: 550-567
DOI:
10.1007/978-3-319-95582-7_33
SO-VID:
6501291a-9d9f-465b-8532-69453af0a18a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Processing Text for Privacy: An Information Flow Perspective
pp. 22
20 Years of Real Real Time Model Validation
pp. 39
Deadlock Detection for Actor-Based Coroutines
pp. 55
An Algebraic Approach for Reasoning About Information Flow
pp. 73
Towards ‘Verifying’ a Water Treatment System
pp. 93
FSM Inference from Long Traces
pp. 110
A Weakness Measure for GR(1) Formulae
pp. 129
Producing Explanations for Rich Logics
pp. 147
The Compound Interest in Relaxing Punctuality
pp. 165
IPL: An Integration Property Language for Multi-model Cyber-physical Systems
pp. 185
Timed Epistemic Knowledge Bases for Social Networks
pp. 203
Optimal and Robust Controller Synthesis
pp. 222
Encoding Fairness in a Synchronous Concurrent Program Algebra
pp. 240
A Wide-Spectrum Language for Verification of Programs on Weak Memory Models
pp. 258
Operational Semantics of a Weak Memory Model with Channel Synchronization
pp. 277
Stepwise Development and Model Checking of a Distributed Interlocking System - Using RAISE
pp. 294
Resource-Aware Design for Reliable Autonomous Applications with Multiple Periods
pp. 312
Verifying Auto-generated C Code from Simulink
pp. 329
QFLan: A Tool for the Quantitative Analysis of Highly Reconfigurable Systems
pp. 338
Modular Verification of Programs with Effects and Effect Handlers in Coq
pp. 355
Combining Tools for Optimization and Analysis of Floating-Point Computations
pp. 364
A Formally Verified Floating-Point Implementation of the Compact Position Reporting Algorithm
pp. 382
Formal Verification of Automotive Simulink Controller Models: Empirical Technical Challenges, Evaluation and Recommendations
pp. 399
Multi-robot LTL Planning Under Uncertainty
pp. 418
Vector Barrier Certificates and Comparison Systems
pp. 438
Timed Vacuity
pp. 466
Dynamic Symbolic Verification of MPI Programs
pp. 485
To Compose, or Not to Compose, That Is the Question: An Analysis of Compositional State Space Generation
pp. 505
View Abstraction for Systems with Component Identities
pp. 523
Compositional Reasoning for Shared-Variable Concurrent Programs
pp. 542
Statistical Model Checking of LLVM Code
pp. 550
SDN-Actors: Modeling and Verification of SDN Programs
pp. 568
CompoSAT: Specification-Guided Coverage for Model Finding
pp. 588
Approximate Partial Order Reduction
pp. 608
A Lightweight Deadlock Analysis for Programs with Threads and Reentrant Locks
pp. 625
Formal Specification and Verification of Dynamic Parametrized Architectures
pp. 647
From Formal Requirements to Highly Assured Software for Unmanned Aircraft Systems
pp. 653
Interlocking Design Automation Using Prover Trident
pp. 657
Model-Based Testing for Avionics Systems
pp. 662
On Software Safety, Security, and Abstract Interpretation
pp. 666
Variant Analysis with QL
pp. 671
Object-Oriented Security Proofs
pp. 675
Z3 and SMT in Industrial R&D
pp. 679
Evidential and Continuous Integration of Software Verification Tools
pp. 686
Disruptive Innovations for the Development and the Deployment of Fault-Free Software
Similar content
4,317
Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks
Authors:
Cheng Li
,
Zhengrui Qin
,
Ed Novak
…
SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks
Authors:
Christian Röpke
,
Thorsten Holz
What is software-defined networking (SDN)? Citrix
Authors:
See all similar