|
|
VPT 2013: Author IndexAuthor | Papers |
---|
A | Ahmed, Abdulbasit | Cryptographic Protocol Verification via Supercompilation (A Case Study) | B | Ben-Amram, Amir | Ranking Functions for Linear-Constraint Loops | D | De Angelis, Emanuele | Verification of Imperative Programs through Transformation of Constraint Logic Programs | F | Finkbeiner, Bernd | Transforming Undecidable Synthesis Problems into Decidable Problems | Fioravanti, Fabio | Verification of Imperative Programs through Transformation of Constraint Logic Programs | H | Hamilton, Geoff | On the Termination of Positive Supercompilation | L | Leroux, Jerome | Acceleration For Presburger Petri Nets | Lisitsa, Alexei | Cryptographic Protocol Verification via Supercompilation (A Case Study) | M | Mery, Dominique | Transforming Event B Models into Verified C# Implementations | Monahan, Rosemary | Transforming Event B Models into Verified C# Implementations | N | Nemytykh, Andrei | Cryptographic Protocol Verification via Supercompilation (A Case Study) | Nepeivoda, Antonina | Ping-Pong Protocols as Prefix Grammars and Turchin Relation | P | Pettorossi, Alberto | Program Transformation for Program Verification | Pettorossi, Alberto | Verification of Imperative Programs through Transformation of Constraint Logic Programs | Proietti, Maurizio | Program Transformation for Program Verification Verification of Imperative Programs through Transformation of Constraint Logic Programs | T | Thompson, Simon | Building trustworthy refactoring tools |
|
|
|