Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2003
- Arvind:
Bluespec: A language for hardware design, simulation, synthesis and verification Invited Talk. MEMOCODE 2003: 249- - Françoise Bellegarde, Celina Charlet, Olga Kouchnarenko:
How to Compute the Refinement Relation for Parameterized Systems. MEMOCODE 2003: 103-112 - Margot Bittner, Florian Kammüller:
Translating Fusion/UML to Object-Z. MEMOCODE 2003: 49-50 - Manfred Broy:
Modular Hierarchies of Models for Embedded Systems. MEMOCODE 2003: 183- - David Cachera, Katell Morin-Allory:
Verification of Control Properties in the Polyhedral Model. MEMOCODE 2003: 265- - Edmund M. Clarke, Orna Grumberg, Muralidhar Talupur, Dong Wang:
High Level Verification of Control Intensive Systems Using Predicate Abstraction. MEMOCODE 2003: 55-64 - Magali Contensin, Laurence Pierre:
Combining ACL2 and a v-calculus Model-Checker to Verify System-Level Designs. MEMOCODE 2003: 75- - Islam A. M. El-Maddah, T. S. E. Maibaum:
Goal-Oriented Requirements Analysis for Process Control Systems Design. MEMOCODE 2003: 45-46 - Sérgio Murilo Maciel Fernandes, Paulo Romero Martins Maciel:
Reliability Evaluation for Dependable Embedded System Specifications: An Approach Based on DSPN. MEMOCODE 2003: 172- - Görschwin Fey, Rolf Drechsler:
Finding Good Counter-Examples to Aid Design Verification. MEMOCODE 2003: 51- - Julio A. de Oliveira Filho, Manoel Eusébio de Lima, Paulo Romero Martins Maciel:
Petri Net Based Interface Analysis for Fast IP-Core Integration. MEMOCODE 2003: 34- - Franco Fummi, Graziano Pravadelli, Andrea Fedeli, Umberto Rossi, Franco Toto:
On the Use of a High-Level Fault Model to Check Properties Incompleteness. MEMOCODE 2003: 145-152 - William B. Gardner:
Bridging CSP and C++ with Selective Formalism and Executable Specifications. MEMOCODE 2003: 237- - Luís Gomes, Anikó Costa:
From Use Cases to System Implementation: Statechart Based Co-design. MEMOCODE 2003: 24-33 - Thierry Grandpierre, Yves Sorel:
From Algorithm and Architecture Specifications to Automatic Generation of Distributed Real-Time Executives: a Seamless Flow of Graphs Transformations. MEMOCODE 2003: 123- - Rajesh K. Gupta, Sandeep K. Shukla:
Should the space of implementation possibilities be determined by the abilities of high-level synthesis and validation? MEMOCODE 2003: 277- - Jinfeng Huang, Jeroen Voeten, Marc Geilen:
Real-time Property Preservation in Approximations of Timed Systems. MEMOCODE 2003: 163-171 - Rohit Jindal, Kshitiz Jain:
Verification of Transaction-Level SystemC models using RTL Testbenches. MEMOCODE 2003: 199-203 - Grant Martin, Sandeep K. Shukla:
Hierarchical and Incremental Verification for System Level Design: Challenges and Accomplishments. MEMOCODE 2003: 97- - Kenneth L. McMillan:
Methods for exploiting SAT solvers in unbounded model checking. MEMOCODE 2003: 135- - José Meseguer:
Executable Computational Logics: Combining Formal Methods and Programming Language Based System Design. MEMOCODE 2003: 3- - Giovanni De Micheli:
Robust System Design with Uncertain Information. MEMOCODE 2003: 283- - Thierry J.-F. Omnés, Gerard Postuma, Jos Verhaegh, Marleen Boonen, Nick Gatherer:
Using SSDE for USB2.0 conformance co-verification. MEMOCODE 2003: 113-122 - Dumitru Potop-Butucaru, Robert de Simone:
Optimizations for Faster Execution of Esterel Programs. MEMOCODE 2003: 227-236 - Jan Romberg, Oscar Slotosch, Gabor Hahn:
MoDe: A Method for System-Level Architecture Evaluation. MEMOCODE 2003: 13-23 - Hiroshi Saito, Kenshu Seto, Yoshihisa Kojima, Satoshi Komatsu, Masahiro Fujita:
Engineering Changes in Field Modifiable Architectures. MEMOCODE 2003: 87-94 - Tobias Schüle, Klaus Schneider:
Exact Runtime Analysis Using Automata-Based Symbolic Simulation. MEMOCODE 2003: 153-162 - Christoph Sprenger, Krzysztof Worytkiewicz:
A Verification Methodology for Infinite-State Message Passing Systems. MEMOCODE 2003: 255-264 - Sudarshan K. Srinivasan, Miroslav N. Velev:
Formal Verification of an Intel XScale Processor Model with Scoreboarding, Specialized Execution Pipelines, and Impress Data-Memory Exceptions. MEMOCODE 2003: 65-74 - Sander Stuijk, Twan Basten:
Analyzing Concurrency in Computational Networks. MEMOCODE 2003: 47-48
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 00:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint