Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
27
views
28
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,023
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
SOFSEM 2013: Theory and Practice of Computer Science
Theory of Multi Core Hypervisor Verification
other
Author(s):
Ernie Cohen
,
Wolfgang Paul
,
Sabine Schmaltz
Publication date
(Print):
2013
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Numerical Algebra, Matrix Theory, Differential-Algebraic Equations, and Control Theory
Most cited references
28
Record
: found
Abstract
: not found
Article
: not found
Formal verification of a realistic compiler
Xavier Leroy
(2009)
0
comments
Cited
117
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
On the computational complexity of algorithms
J. Hartmanis
,
R. E. Stearns
(1965)
0
comments
Cited
88
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
VCC: A Practical System for Verifying Concurrent C
Ernie Cohen
,
Markus Dahlweid
,
Mark A. Hillebrand
…
(2009)
0
comments
Cited
52
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2013
Pages
: 1-27
DOI:
10.1007/978-3-642-35843-2_1
SO-VID:
c834c3f8-a451-4c4b-8bb2-1e81f13d09f4
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Theory of Multi Core Hypervisor Verification
pp. 28
Software Components in Computer Assisted Living?
pp. 29
Engineering Algorithms for Large Data Sets
pp. 33
Core Stability in Hedonic Coalition Formation
pp. 51
Software Production: A New Paradigm for Software Engineering Research
pp. 52
A Model of the Commit Size Distribution of Open Source
pp. 67
ISICIL: Semantics and Social Networks for Business Intelligence
pp. 86
A Multi-dimensional Comparison of Ontology Design Patterns for Representing n-ary Relations
pp. 106
Cognition-Enabled Autonomous Robot Control for the Realization of Home Chore Task Intelligence
pp. 107
Searching Things in Large Sets of Images
pp. 108
SOS Rule Formats for Idempotent Terms and Idempotent Unary Operators
pp. 121
Worst Case Analysis of Non-local Games
pp. 133
Two-Dimensional Rational Automata: A Bridge Unifying One- and Two-Dimensional Language Theory
pp. 146
Flow Decompositions in External Memory
pp. 157
Improved Approximations for Ordered TSP on Near-Metric Graphs,
pp. 169
Asymptotic Risk Analysis for Trust and Reputation Systems
pp. 182
Being Caught between a Rock and a Hard Place in an Election – Voter Deterrence by Deletion of Candidates
pp. 194
Collective Additive Tree Spanners of Bounded Tree-Breadth Graphs with Generalizations and Consequences
pp. 207
Weak Arithmetic Completeness of Object-Oriented First-Order Assertion Networks
pp. 220
Generalising and Unifying SLUR and Unit-Refutation Completeness
pp. 233
On Structural Parameterizations for the 2-Club Problem
pp. 244
On Languages of One-Dimensional Overlapping Tiles
pp. 257
An Exact Algorithm to Check the Existence of (Elementary) Paths and a Generalisation of the Cut Problem in Graphs with Forbidden Transitions
pp. 268
Polynomial Time Algorithms for Computing a Minimum Hull Set in Distance-Hereditary and Chordal Graphs
pp. 280
Permuted Pattern Matching on Multi-track Strings
pp. 292
Online and Quasi-online Colorings of Wedges and Intervals
pp. 307
Logic Characterization of Invisibly Structured Languages: The Case of Floyd Languages
pp. 319
Incomplete Transition Complexity of Some Basic Operations
pp. 332
Algorithms and Almost Tight Results for 3-Colorability of Small Diameter Graphs
pp. 344
Approximating the k-Splittable Capacitated Network Design Problem
pp. 356
Mixed Hypergraphs for Linear-Time Construction of Denser Hashing-Based Data Structures
pp. 369
Coalgebraic Bisimulation-Up-To
pp. 382
A Model Transformation Language Based on Logic Programming
pp. 395
Hypermodelling Reporting: Towards Cockpits for Code Structure
pp. 408
Search in Source Code Based on Identifying Popular Fragments
pp. 420
SimCo – Hybrid Simulator for Testing of Component Based Applications
pp. 432
Refinement Inference for Sequence Diagrams
pp. 445
Improving Relevance of Keyword Extraction from the Web Utilizing Visual Style Information
pp. 457
Utilizing Microblogs for Web Page Relevant Term Acquisition
pp. 469
State Coverage: An Empirical Analysis Based on a User Study
pp. 481
Surrogate Model for Mixed-Variables Evolutionary Optimization Based on GLM and RBF Networks
pp. 491
Computing Semantic Similarity Using Large Static Corpora
pp. 503
The Orchestra of Multiple Model Repositories
pp. 515
An Ontology-Driven Fuzzy Workflow System
pp. 528
Constructs Replacing and Complexity Downgrading via a Generic OWL Ontology Transformation Framework
pp. 540
Tempo Adaptation within Interactive Music Instruments in Mobile Phone
pp. 552
Dynamic Voting Interface in Social Media: Does it Affect Individual Votes?
Similar content
4,023
Guardian: Hypervisor as Security Foothold for Personal Computers
Authors:
Yueqiang Cheng
,
Xuhua Ding
LiteVisor: A Network Hypervisor to Support Flow Aggregation and Seamless Network Reconfiguration for VM Migration in Virtualized Software-defined Networks
Authors:
Gyeongsik Yang
,
Bong-yeol Yu
,
Seong-Mun Kim
…
HyperCrypt: Hypervisor-Based Encryption of Kernel and User Space
Authors:
Johannes Gotzfried
,
Nico Dorr
,
Ralph Palutke
…
See all similar
Cited by
2
Invariant Synthesis for Incomplete Verification Engines
Authors:
P. Madhusudan
,
Pranav Garg
,
Shambwaditya Saha
…
High-Assurance Separation Kernels: A Survey on Formal Methods
Authors:
Yongwang Zhao
,
David Sanan
,
Fuyuan Zhang
…
See all cited by