[12-10]Software Debugging through Dynamic Analysis of Program Structures
|
2009-12-09 |
[12-5]The 1st ISCAS-UQ Joint Workshop
|
2009-12-03 |
[12-3]A Formal Model of Ontology for Handling Fuzzy Membership and Typicality of Instances
|
2009-12-01 |
[11-30]On-the-Fly Model Checking of Security Protocols
|
2009-11-19 |
[11-27]Logic, Graphs and Parameterized Complexity
|
2009-11-19 |
[11-17]Three years of research at the MSR-INRIA Joint Centre
|
2009-11-13 |
[11-16]Model-based tool-chain for the design and analysis of embedded hybrid systems
|
2009-11-13 |
[10-29]Using Software Changes to Understand Software Projects
|
2009-10-28 |
[10-27]Component-based Construction of Heterogeneous Real-time Systems in BIP
|
2009-10-20 |
[10-16]Model Checking: My 28-year Quest to Overcome the State Explosion Problem
|
2009-10-12 |
[10-15]Unifying Theories of Data Flow
|
2009-10-09 |
[9-23]Mobility in Ad Hoc Wireless Networks: Friend or Foe
|
2009-09-22 |
[9-10]Formal security proofs for cryptographic algorithms and their implementations
|
2009-09-07 |
[9-1]Certification of code-based cryptographic proofs
|
2009-08-27 |
[8-14]RELATIVE INFORMATION COMPLETENESS
|
2009-08-11 |