Search

Your search keyword '"Department of Formal Methods (LORIA - FM)"' showing total 40 results

Search Constraints

Start Over You searched for: Author "Department of Formal Methods (LORIA - FM)" Remove constraint Author: "Department of Formal Methods (LORIA - FM)" Publisher springer international publishing Remove constraint Publisher: springer international publishing
40 results on '"Department of Formal Methods (LORIA - FM)"'

Search Results

1. Offline and Online Monitoring of Scattered Uncertain Logs Using Uncertain Linear Dynamical Systems

2. Parametric Toricity of Steady State Varieties of Reaction Networks

3. Theoretical Computer Science: Computability, Decidability and Logic

4. Towards Dynamic Dependable Systems Through Evidence-Based Continuous Certification

5. Extending a Brainiac Prover to Lambda-Free Higher-Order Logic

6. Extending SMT Solvers to Higher-Order Logic

7. Verification by Construction of Distributed Algorithms

8. A Rigorous Correctness Proof for Pastry

9. Compliance, Functional Safety and Fault Detection by Formal Methods

10. Analyzing Requirements Using Environment Modelling

11. A Polite Non-Disjoint Combination Method: Theories with Bridging Functions Revisited

12. A Gentle Non-disjoint Combination of Satisfiability Procedures

13. The Parameterized Complexity of Domination-Type Problems and Application to Linear Codes

14. On Privacy of Multidimensional Data Against Aggregate Knowledge Attacks

15. Leveraging Event-B Theories for Handling Domain Knowledge in Design Models

16. Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks

17. Deciding the Bernays-Schoenfinkel Fragment over Bounded Difference Constraints by Simple Clause Learning over Theories

18. Non-disjoint Combined Unification and Closure by Equational Paramodulation

19. The DEEPSEC Prover

20. A Pedagogical Example: A Family of Stochastic Cellular Automata that Plays Alesia

21. Privacy Scoring of Social Network User Profiles Through Risk Analysis

22. Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches

23. Notions of Knowledge in Combinations of Theories Sharing Constructors

24. Constraint Solving for Verifying Modal Specifications of Workflow Nets with Data

25. Automated Verification of e-Cash Protocols

26. Collective Infotaxis with Reactive Amoebae: A Note on a Simple Bio-inspired Mechanism

27. The Typical Constructible Object

28. Reversibility in Extended Measurement-Based Quantum Computation

29. Towards Real-Time Co-authoring of Linked-Data on the Web

30. A Cloud-Based Reusable Design for Mobile Data Sharing

31. Unification and Matching in Hierarchical Combinations of Syntactic Theories

32. A Maximum Variance Approach for Graph Anonymization

33. Sequential Generation of Structured Arrays and Its Deductive Verification

34. Efficient and Decentralized Polling Protocol for General Social Networks

35. Malware Message Classification by Dynamic Analysis

36. Topological Analysis of Representations

37. A Unifying Splitting Framework

38. Secure Auctions without Cryptography

39. On Constrained Adding Friends in Social Networks

40. A Sorted Datalog Hammer for Supervisor Verification Conditions Modulo Simple Linear Arithmetic

Catalog

Books, media, physical & digital resources