default search action
19th MEMOCODE 2021: Virtual Event, China
- S. Arun-Kumar, Dominique Méry, Indranil Saha, Lijun Zhang:
MEMOCODE '21: 19th ACM-IEEE International Conference on Formal Methods and Models for System Design, Virtual Event, China, November 20 - 22, 2021. ACM 2021, ISBN 978-1-4503-9127-6 - Mohammed Barhoush, Alireza Mahzoon, Rolf Drechsler:
Polynomial word-level verification of arithmetic circuits. 1-9 - Ignacio D. Lopez-Miguel, Borja Fernández Adiego, Jean-Charles Tournier, Enrique Blanco Viñuela, Juan A. Rodríguez-Aguilar:
Simplification of numeric variables for PLC model checking. 10-20 - Khalil Esper, Stefan Wildermann, Jürgen Teich:
Enforcement FSMs: specification and verification of non-functional properties of program executions on MPSoCs. 21-31 - Dominik Walter, Jürgen Teich:
LION: real-time I/O transfer control for massively parallel processor arrays. 32-43 - Mathis Niehage, Arnd Hartmanns, Anne Remke:
Learning optimal decisions for stochastic hybrid systems. 44-55 - Abhinandan Panda, Srinivas Pinisetty, Partha S. Roop:
A secure insulin infusion system using verification monitors. 56-65 - Klaus Schneider:
Translating structured sequential programs to dataflow graphs. 66-77 - Ennio Visconti, Ezio Bartocci, Michele Loreti, Laura Nenzi:
Online monitoring of spatio-temporal properties for imprecise signals. 78-88 - Shenghao Yuan, Jean-Pierre Talpin:
Verified functional programming of an IoT operating system's bootloader. 89-97 - Felix Freiberger, Stefan Schupp, Holger Hermanns, Erika Ábrahám:
Controller verification meets controller code: a case study. 98-103 - Marcel Christian Werner, Klaus Schneider:
Translation of continuous function charts to imperative synchronous quartz programs. 104-110 - Adam Petz, Grant Jurgensen, Perry Alexander:
Design and formal verification of a copland-based attestation protocol. 111-117 - Nicolas Basset, Thao Dang, Felix Gigler, Cristinel Mateis, Dejan Nickovic:
Sampling of shape expressions with ShapEx. 118-125 - Farhaan Fowze, Tuba Yavuz:
SEESAW: a tool for detecting memory vulnerabilities in protocol stack implementations. 126-133 - Kelvin Anto, Partha S. Roop, Akshya K. Swain:
Formal modelling of attack scenarios and mitigation strategies in IEEE 1588. 134-141
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.