Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Isabelle/HOL: a proof assistant for higher-order logicJanuary 2002
  • Authors:
  • Tobias Nipkow,
  • Markus Wenzel,
  • Lawrence C. Paulson
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-3-540-43376-7
Published:01 January 2002
Pages:
211
Skip Bibliometrics Section
Reflects downloads up to 04 Jan 2025Bibliometrics
Abstract

No abstract available.

References

  1. David Aspinall. Proof General. http://www.proofgeneral.org.Google ScholarGoogle Scholar
  2. David Aspinall. Proof General: A generic tool for proof development. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1785 of Lecture Notes in Computer Science, pages 38-42. Springer-Verlag, 2000.Google ScholarGoogle Scholar
  3. Franz Baader and Tobias Nipkow. Term Rewriting and All That. Cambridge University Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gertrud Bauer, Tobias Nipkow, David von Oheimb, Lawrence C Paulson, Thomas M Rasmussen, Christophe Tabacznyj, and MarkusWenzel. The supplemental Isabelle/HOL library. Part of the Isabelle distribution, http://isabelle.in.tum.de/library/HOL/Library/document.pdf, 2002.Google ScholarGoogle Scholar
  5. Richard Bird. Introduction to Functional Programming using Haskell. Prentice-Hall, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. Proceedings of the Royal Society of London, 426:233-271, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  7. Edmund Clarke, Orna Grumberg, and Doron Peled. Model Checking. MIT Press, 1999.Google ScholarGoogle Scholar
  8. Jacques Fleuriot and Lawrence C. Paulson. Mechanizing nonstandard real analysis. LMS Journal of Computation and Mathematics, 3:140-190, 2000. http://www.lms.ac.uk/jcm/3/lms1999-027/.Google ScholarGoogle ScholarCross RefCross Ref
  9. Jean-Yves Girard. Proofs and Types. Cambridge University Press, 1989. Translated by Yves LaFont and Paul Taylor.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. J. C. Gordon and T. F. Melham, editors. Introduction to HOL: A Theorem Proving Environment for Higher Order Logic. Cambridge University Press, 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. David Harel, Dexter Kozen, and Jerzy Tiuryn. Dynamic Logic. MIT Press, 2000.Google ScholarGoogle Scholar
  12. John E. Hopcroft and Jeffrey D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 1979.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Paul Hudak. The Haskell School of Expression. Cambridge University Press, 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Michael Huth and Mark Ryan. Logic in Computer Science. Modelling and reasoning about systems. Cambridge University Press, 2000.Google ScholarGoogle Scholar
  15. Donald E. Knuth. The Art of Computer Programming, Volume 3: Sorting and Searching. Addison-Wesley, 1975.Google ScholarGoogle Scholar
  16. Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems: second international workshop, TACAS'96, LNCS 1055, pages 147-166. Springer, 1996. Google ScholarGoogle Scholar
  17. Robin Milner, Mads Tofte, and Robert Harper. The Definition of Standard ML. MIT Press, 1990.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Olaf Müller, Tobias Nipkow, David von Oheimb, and Oscar Slotosch. HOLCF = HOL + LCF. Journal of Functional Programming, 9:191- 223, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Wolfgang Naraschewski and Markus Wenzel. Object-oriented verification based on record subtyping in higher-order logic. In Jim Grundy and Malcom Newey, editors, Theorem Proving in Higher Order Logics: TPHOLs'98, LNCS 1479, 1998.Google ScholarGoogle Scholar
  20. Roger M. Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, December 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Tobias Nipkow. Functional unification of higher-order patterns. In M. Vardi, editor, Eighth Annual Symposium on Logic in Computer Science, pages 64-74. ieee Computer Society Press, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  22. Tobias Nipkow, Lawrence C. Paulson, and Markus Wenzel. Isabelle's Logics: HOL. http://isabelle.in.tum.de/doc/logics-HOL.pdf.Google ScholarGoogle Scholar
  23. Lawrence C. Paulson. The Isabelle Reference Manual. http://isabelle. in.tum.de/doc/ref.pdf.Google ScholarGoogle Scholar
  24. Lawrence C. Paulson. Relations between secrets: Two formal analyses of the Yahalom protocol. Journal of Computer Security. in press.Google ScholarGoogle Scholar
  25. Lawrence C. Paulson. Logic and Computation: Interactive proof with Cambridge LCF. Cambridge University Press, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  26. Lawrence C. Paulson. Isabelle: A Generic Theorem Prover. Springer, 1994. LNCS 828.Google ScholarGoogle Scholar
  27. Lawrence C. Paulson. ML for the Working Programmer. Cambridge University Press, 2nd edition, 1996.Google ScholarGoogle Scholar
  28. Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Lawrence C. Paulson. Inductive analysis of the Internet protocol TLS. ACM Transactions on Information and System Security, 2(3):332-351, August 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. F. J. Pelletier. Seventy-five problems for testing automatic theorem provers. Journal of Automated Reasoning, 2:191-216, 1986. Errata, JAR 4 (1988), 235-236 and JAR 18 (1997), 135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Kenneth H. Rosen. Discrete Mathematics and Its Applications. McGraw-Hill, 1998.Google ScholarGoogle Scholar
  32. Simon Thompson. Haskell: The Craft of Functional Programming. Addison-Wesley, 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Markus Wenzel. The Isabelle/Isar Reference Manual. http://isabelle.in. tum.de/doc/isar-ref.pdf.Google ScholarGoogle Scholar
  34. Markus Wenzel. Isabelle/Isar -- a versatile environment for humanreadable formal proof documents. PhD thesis, Institut für Informatik, Technische Universität München, 2002.Google ScholarGoogle Scholar
  35. Markus Wenzel and Stefan Berghofer. The Isabelle System Manual. http://isabelle.in.tum.de/doc/system.pdf.Google ScholarGoogle Scholar

Cited By

  1. ACM
    Lu M, Delaware B and Zhang T Proof Automation with Large Language Models Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, (1509-1520)
  2. ACM
    Dardinier T, Li A and Müller P (2024). Hypra: A Deductive Program Verifier for Hyper Hoare Logic, Proceedings of the ACM on Programming Languages, 8:OOPSLA2, (1279-1308), Online publication date: 8-Oct-2024.
  3. ACM
    Zueck D, Atallah N, Do I, Yao Z and Sani A Hora: High Assurance Periodic Availability Guarantee for Life-Critical Applications on Smartphones Proceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on Systems, (115-121)
  4. ACM
    Dardinier T and Müller P (2024). Hyper Hoare Logic: (Dis-)Proving Program Hyperproperties, Proceedings of the ACM on Programming Languages, 8:PLDI, (1485-1509), Online publication date: 20-Jun-2024.
  5. Hoag A, Kostas J, Silva B, Thomas P and Brun Y Seldonian Toolkit: Building Software with Safe and Fair Machine Learning Proceedings of the 45th International Conference on Software Engineering: Companion Proceedings, (107-111)
  6. Agrawal A, First E, Kaufman Z, Reichel T, Zhang S, Zhou T, Sanchez-Stern A, Ringer T and Brun Y Proofster: Automated Formal Verification Proceedings of the 45th International Conference on Software Engineering: Companion Proceedings, (26-30)
  7. ACM
    Erata F, Deng S, Zaghloul F, Xiong W, Demir O and Szefer J (2022). Survey of Approaches and Techniques for Security Verification of Computer Systems, ACM Journal on Emerging Technologies in Computing Systems, 19:1, (1-34), Online publication date: 31-Jan-2023.
  8. ACM
    Guo Y, Wang Z, Zhong B and Zeng Q Formal Modeling and Security Analysis for Intra-level Privilege Separation Proceedings of the 38th Annual Computer Security Applications Conference, (88-101)
  9. ACM
    Debant A, Delaune S and Wiedling C (2022). So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols, ACM Transactions on Privacy and Security, 25:2, (1-39), Online publication date: 31-May-2022.
  10. ACM
    First E and Brun Y Diversity-driven automated formal verification Proceedings of the 44th International Conference on Software Engineering, (749-761)
  11. ACM
    Milehins M An extension of the framework types-to-sets for Isabelle/HOL Proceedings of the 11th ACM SIGPLAN International Conference on Certified Programs and Proofs, (180-196)
  12. Wang Y, He J, Zhu N, Yi Y, Zhang Q, Song H and Xue R (2021). Security enhancement technologies for smart contracts in the blockchain, Transactions on Emerging Telecommunications Technologies, 32:12, Online publication date: 8-Dec-2021.
  13. ACM
    Yuan S and Talpin J Verified functional programming of an IoT operating system's bootloader Proceedings of the 19th ACM-IEEE International Conference on Formal Methods and Models for System Design, (89-97)
  14. ACM
    Lehr J, Bischof C, Dewald F, Mantel H, Norouzi M and Wolf F Tool-Supported Mini-App Extraction to Facilitate Program Analysis and Parallelization 50th International Conference on Parallel Processing, (1-10)
  15. ACM
    Dupont G, Ait-Ameur Y, Singh N and Pantel M (2021). Event-B Hybridation, ACM Transactions on Embedded Computing Systems, 20:4, (1-37), Online publication date: 31-Jul-2021.
  16. ACM
    Burjons E, Frei F and Raszyk M From finite-valued nondeterministic transducers to deterministic two-tape automata Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
  17. ACM
    Chen H, Pendleton M, Njilla L and Xu S (2020). A Survey on Ethereum Systems Security, ACM Computing Surveys, 53:3, (1-43), Online publication date: 31-May-2021.
  18. ACM
    Sanan D, Zhao Y, Lin S and Yang L (2021). CSim, ACM Transactions on Programming Languages and Systems, 43:1, (1-46), Online publication date: 31-Mar-2021.
  19. ACM
    Becker H, Bos N, Gavran I, Darulova E and Majumdar R Lassie: HOL4 tactics by example Proceedings of the 10th ACM SIGPLAN International Conference on Certified Programs and Proofs, (212-223)
  20. ACM
    Hu J and Carette J Formalizing category theory in Agda Proceedings of the 10th ACM SIGPLAN International Conference on Certified Programs and Proofs, (327-342)
  21. Khan W, Khan F, Derhab A, Alhudhaif A and Chen H (2021). CoCEC, Complexity, 2021, Online publication date: 1-Jan-2021.
  22. Sachtleben R An Executable Mechanised Formalisation of an Adaptive State Counting Algorithm Testing Software and Systems, (236-254)
  23. ACM
    First E, Brun Y and Guha A (2020). TacTok: semantics-aware proof synthesis, Proceedings of the ACM on Programming Languages, 4:OOPSLA, (1-31), Online publication date: 13-Nov-2020.
  24. Hance T, Lattuada A, Hawblitzel C, Howell J, Johnson R and Parno B Storage systems are distributed systems (so verify them that way!) Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, (99-115)
  25. Hähnle R, Heydari Tabar A, Mazaheri A, Norouzi M, Steinhöfel D and Wolf F Safer Parallelization Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, (117-137)
  26. Lamela Seijas P, Smith D and Thompson S Efficient Static Analysis of Marlowe Contracts Leveraging Applications of Formal Methods, Verification and Validation: Applications, (161-177)
  27. Gurov D, Hähnle R and Kamburjan E Who Carries the Burden of Modularity? Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles, (3-21)
  28. Verbeek F, Olivier P and Ravindran B Sound C Code Decompilation for a Subset of x86-64 Binaries Software Engineering and Formal Methods, (247-264)
  29. Nguyen Van H, Balabonski T, Boulanger F, Keller C, Valiron B and Wolff B On the Semantics of Polychronous Polytimed Specifications Formal Modeling and Analysis of Timed Systems, (23-40)
  30. ACM
    Selsam D, Hudon S and de Moura L (2020). Sealing pointer-based optimizations behind pure functions, Proceedings of the ACM on Programming Languages, 4:ICFP, (1-20), Online publication date: 2-Aug-2020.
  31. Nagashima Y Simple Dataset for Proof Method Recommendation in Isabelle/HOL Intelligent Computer Mathematics, (297-302)
  32. van Doorn F, Ebner G and Lewis R Maintaining a Library of Formal Mathematics Intelligent Computer Mathematics, (251-267)
  33. Kovács L, Lachnitt H and Szeider S Formalizing Graph Trail Properties in Isabelle/HOL Intelligent Computer Mathematics, (190-205)
  34. Fu Y and Yu W A Formalization of Properties of Continuous Functions on Closed Intervals Mathematical Software – ICMS 2020, (272-280)
  35. ACM
    Sickert S and Esparza J An Efficient Normalisation Procedure for Linear Temporal Logic and Very Weak Alternating Automata Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, (831-844)
  36. From A, Blackburn P and Villadsen J Formalizing a Seligman-Style Tableau System for Hybrid Logic Automated Reasoning, (474-481)
  37. Passmore G, Cruanes S, Ignatovich D, Aitken D, Bray M, Kagan E, Kanishev K, Maclean E and Mometto N The Imandra Automated Reasoning System (System Description) Automated Reasoning, (464-471)
  38. Czajka Ł Practical Proof Search for Coq by Type Inhabitation Automated Reasoning, (28-57)
  39. Rau M and Nipkow T Verification of Closest Pair of Points Algorithms Automated Reasoning, (341-357)
  40. Baanen A A Lean Tactic for Normalising Ring Expressions with Exponents (Short Paper) Automated Reasoning, (21-27)
  41. Guttmann W Reasoning About Algebraic Structures with Implicit Carriers in Isabelle/HOL Automated Reasoning, (236-253)
  42. ACM
    Nguyen T, Pham L, Sun J, Lin Y and Minh Q sFuzz Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (778-788)
  43. Bila E, Doherty S, Dongol B, Derrick J, Schellhorn G and Wehrheim H Defining and Verifying Durable Opacity: Correctness for Persistent Software Transactional Memory Formal Techniques for Distributed Objects, Components, and Systems, (39-58)
  44. Bottesch R, Haslbeck M, Reynaud A and Thiemann R Verifying a Solver for Linear Mixed Integer Arithmetic in Isabelle/HOL NASA Formal Methods, (233-250)
  45. Abbas M, Ben-Yelles C and Rioboo R (2019). Formalizing UML/OCL structural features with FoCaLiZe, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:6, (4149-4164), Online publication date: 1-Mar-2020.
  46. Khan W, Kamran M, Naqvi S, Khan F, Alghamdi A, Alsolami E and Al-Turjman F (2020). Formal Verification of Hardware Components in Critical Systems, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
  47. ACM
    Xia L, Zakowski Y, He P, Hur C, Malecha G, Pierce B and Zdancewic S (2019). Interaction trees: representing recursive and impure programs in Coq, Proceedings of the ACM on Programming Languages, 4:POPL, (1-32), Online publication date: 1-Jan-2020.
  48. Moore J (2019). Milestones from the Pure Lisp theorem prover to ACL2, Formal Aspects of Computing, 31:6, (699-732), Online publication date: 1-Dec-2019.
  49. Celik A, Palmskog K, Parovic M, Arias E and Gligoric M Mutation analysis for Coq Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, (539-551)
  50. Marmsoler D and Gidey H (2019). Interactive verification of architectural design patterns in FACTum, Formal Aspects of Computing, 31:5, (541-610), Online publication date: 1-Nov-2019.
  51. ACM
    Ma H, Goel A, Jeannin J, Kapritsos M, Kasikci B and Sakallah K I4 Proceedings of the 27th ACM Symposium on Operating Systems Principles, (370-384)
  52. Reiher T, Senier A, Castrillon J and Strufe T RecordFlux: Formal Message Specification and Generation of Verifiable Binary Parsers Formal Aspects of Component Software, (170-190)
  53. Brucker A and Herzberg M A Formally Verified Model of Web Components Formal Aspects of Component Software, (51-71)
  54. Groote J, Keiren J, Luttik B, de Vink E and Willemse T Modelling and Analysing Software in mCRL2 Formal Aspects of Component Software, (25-48)
  55. ACM
    Konnov I, Kukovec J and Tran T (2019). TLA+ model checking made symbolic, Proceedings of the ACM on Programming Languages, 3:OOPSLA, (1-30), Online publication date: 10-Oct-2019.
  56. Marmsoler D and Blakqori G APML: An Architecture Proof Modeling Language Formal Methods – The Next 30 Years, (611-630)
  57. Smith G, Coughlin N and Murray T Value-Dependent Information-Flow Security on Weak Memory Models Formal Methods – The Next 30 Years, (539-555)
  58. Miyazawa A, Ribeiro P, Li W, Cavalcanti A, Timmis J and Woodcock J (2019). RoboChart, Software and Systems Modeling (SoSyM), 18:5, (3097-3149), Online publication date: 1-Oct-2019.
  59. Shukla N, Pandey M and Srivastava S (2019). Formal modeling and verification of software‐defined networks, International Journal of Network Management, 29:5, Online publication date: 12-Sep-2019.
  60. ACM
    O'Connor L Deferring the details and deriving programs Proceedings of the 4th ACM SIGPLAN International Workshop on Type-Driven Development, (27-39)
  61. Bentkamp A, Blanchette J and Klakow D (2019). A Formal Proof of the Expressiveness of Deep Learning, Journal of Automated Reasoning, 63:2, (347-368), Online publication date: 1-Aug-2019.
  62. ACM
    Walter M, Wille R, Große D, Torres F and Drechsler R (2019). Placement and Routing for Tile-based Field-coupled Nanocomputing Circuits Is NP-complete (Research Note), ACM Journal on Emerging Technologies in Computing Systems, 15:3, (1-10), Online publication date: 31-Jul-2019.
  63. ACM
    Zhao J, Oliveira B and Schrijvers T (2019). A mechanical formalization of higher-ranked polymorphic type inference, Proceedings of the ACM on Programming Languages, 3:ICFP, (1-29), Online publication date: 26-Jul-2019.
  64. Unruh D Quantum Hoare logic with ghost variables Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
  65. ACM
    Libal T and Pascucci M Automated reasoning in normative detachment structures with ideal conditions Proceedings of the Seventeenth International Conference on Artificial Intelligence and Law, (63-72)
  66. Jones C and Yatapanage N (2019). Investigating the limits of rely/guarantee relations based on a concurrent garbage collector example, Formal Aspects of Computing, 31:3, (353-374), Online publication date: 1-Jun-2019.
  67. ACM
    Ma H, Goel A, Jeannin J, Kapritsos M, Kasikci B and Sakallah K Towards Automatic Inference of Inductive Invariants Proceedings of the Workshop on Hot Topics in Operating Systems, (30-36)
  68. ACM
    Bjørner D (2019). Domain Analysis and Description Principles, Techniques, and Modelling Languages, ACM Transactions on Software Engineering and Methodology, 28:2, (1-67), Online publication date: 9-Apr-2019.
  69. Kună?Ar O and Popescu A (2019). A Consistent Foundation for Isabelle/HOL, Journal of Automated Reasoning, 62:4, (531-555), Online publication date: 1-Apr-2019.
  70. Nikolić M, Marinković V, Kovács Z and Janiă?Ić P (2019). Portfolio theorem proving and prover runtime prediction for geometry, Annals of Mathematics and Artificial Intelligence, 85:2-4, (119-146), Online publication date: 1-Apr-2019.
  71. Stojanović-?Ură?Ević S (2019). From informal to formal proofs in Euclidean geometry, Annals of Mathematics and Artificial Intelligence, 85:2-4, (89-117), Online publication date: 1-Apr-2019.
  72. Hayes I, Meinicke L, Winter K and Colvin R (2019). A synchronous program algebra: a basis for reasoning about shared-memory and event-based concurrency, Formal Aspects of Computing, 31:2, (133-163), Online publication date: 1-Apr-2019.
  73. Nipkow T and Brinkop H (2019). Amortized Complexity Verified, Journal of Automated Reasoning, 62:3, (367-391), Online publication date: 1-Mar-2019.
  74. Marić F (2019). Fast Formal Proof of the Erd?s---Szekeres Conjecture for Convex Polygons with at Most 6 Points, Journal of Automated Reasoning, 62:3, (301-329), Online publication date: 1-Mar-2019.
  75. Kună?Ar O and Popescu A (2019). From Types to Sets by Local Type Definition in Higher-Order Logic, Journal of Automated Reasoning, 62:2, (237-260), Online publication date: 1-Feb-2019.
  76. Immler F and Traut C (2019). The Flow of ODEs, Journal of Automated Reasoning, 62:2, (215-236), Online publication date: 1-Feb-2019.
  77. Lammich P and Sefidgar S (2019). Formalizing Network Flow Algorithms, Journal of Automated Reasoning, 62:2, (261-280), Online publication date: 1-Feb-2019.
  78. Gabmeyer S, Kaufmann P, Seidl M, Gogolla M and Kappel G (2019). A feature-based classification of formal verification techniques for software models, Software and Systems Modeling (SoSyM), 18:1, (473-498), Online publication date: 1-Feb-2019.
  79. Fellner A and Woltzenlogel Paleo B (2019). Greedy pebbling for proof space compression, International Journal on Software Tools for Technology Transfer (STTT), 21:1, (71-86), Online publication date: 1-Feb-2019.
  80. ACM
    Yang Y and Song Z LBAC Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, (103-109)
  81. ACM
    Roessle I, Verbeek F and Ravindran B Formally verified big step semantics out of x86-64 binaries Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, (181-195)
  82. ACM
    Lochmann A and Sternagel C Certified ACKBO Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, (144-151)
  83. ACM
    Immler F and Zhan B Smooth manifolds and types to sets for linear algebra in Isabelle/HOL Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, (65-77)
  84. ACM
    Unruh D (2019). Quantum relational Hoare logic, Proceedings of the ACM on Programming Languages, 3:POPL, (1-31), Online publication date: 2-Jan-2019.
  85. Zhao Y, Sanan D, Zhang F and Liu Y (2019). Refinement-Based Specification and Security Analysis of Separation Kernels, IEEE Transactions on Dependable and Secure Computing, 16:1, (127-141), Online publication date: 1-Jan-2019.
  86. Li W, Passmore G and Paulson L (2019). Deciding Univariate Polynomial Problems Using Untrusted Certificates in Isabelle/HOL, Journal of Automated Reasoning, 62:1, (69-91), Online publication date: 1-Jan-2019.
  87. ACM
    Vazou N, Breitner J, Kunkel R, Van Horn D and Hutton G (2018). Theorem proving for all: equational reasoning in liquid Haskell (functional pearl), ACM SIGPLAN Notices, 53:7, (132-144), Online publication date: 7-Dec-2018.
  88. ACM
    Taube M, Losa G, McMillan K, Padon O, Sagiv M, Shoham S, Wilcox J and Woos D (2018). Modularity for decidability of deductive verification with applications to distributed systems, ACM SIGPLAN Notices, 53:4, (662-677), Online publication date: 2-Dec-2018.
  89. Cofer D, Gacek A, Backes J, Whalen M, Pike L, Foltzer A, Podhradsky M, Klein G, Kuz I, Andronick J, Heiser G and Stuart D (2018). A Formal Approach to Constructing Secure Air Vehicle Software, Computer, 51:11, (14-23), Online publication date: 1-Nov-2018.
  90. ACM
    Li Y, Duan K, Jansen D, Pang J, Zhang L, Lv Y and Cai S (2018). An Automatic Proving Approach to Parameterized Verification, ACM Transactions on Computational Logic, 19:4, (1-25), Online publication date: 31-Oct-2018.
  91. Seshia S and Subramanyan P UCLID5 Proceedings of the 16th ACM-IEEE International Conference on Formal Methods and Models for System Design, (1-10)
  92. ACM
    Bartoletti M and Zunino R BitML Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (83-100)
  93. ACM
    Vazou N, Breitner J, Kunkel R, Van Horn D and Hutton G Theorem proving for all: equational reasoning in liquid Haskell (functional pearl) Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, (132-144)
  94. ACM
    Nagashima Y and He Y PaMpeR: proof method recommendation system for Isabelle/HOL Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (362-372)
  95. ACM
    Grewe S, Erdweg S, Pacak A and Mezini M System Description Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming, (1-10)
  96. ACM
    Breitner J, Spector-Zabusky A, Li Y, Rizkallah C, Wiegley J and Weirich S (2018). Ready, set, verify! applying hs-to-coq to real-world Haskell code (experience report), Proceedings of the ACM on Programming Languages, 2:ICFP, (1-16), Online publication date: 30-Jul-2018.
  97. ACM
    Palmskog K, Celik A and Gligoric M piCoq: parallel regression proving for large-scale verification projects Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, (344-355)
  98. Brandt F, Saile C and Stricker C Voting with Ties Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (1285-1293)
  99. ACM
    Taube M, Losa G, McMillan K, Padon O, Sagiv M, Shoham S, Wilcox J and Woos D Modularity for decidability of deductive verification with applications to distributed systems Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, (662-677)
  100. Blanchette J, Fleury M, Lammich P and Weidenbach C (2018). A Verified SAT Solver Framework with Learn, Forget, Restart, and Incrementality, Journal of Automated Reasoning, 61:1-4, (333-365), Online publication date: 1-Jun-2018.
  101. Immler F (2018). A Verified ODE Solver and the Lorenz Attractor, Journal of Automated Reasoning, 61:1-4, (73-111), Online publication date: 1-Jun-2018.
  102. Schlichtkrull A (2018). Formalization of the Resolution Calculus for First-Order Logic, Journal of Automated Reasoning, 61:1-4, (455-484), Online publication date: 1-Jun-2018.
  103. Diekmann C, Hupel L, Michaelis J, Haslbeck M and Carle G (2018). Verified iptables Firewall Analysis and Verification, Journal of Automated Reasoning, 61:1-4, (191-242), Online publication date: 1-Jun-2018.
  104. Bertot Y, Rideau L and Théry L (2018). Distant Decimals of $$\pi $$ź, Journal of Automated Reasoning, 61:1-4, (33-71), Online publication date: 1-Jun-2018.
  105. Bauereiβ T, Pesenti Gritti A, Popescu A and Raimondi F (2018). CoSMed, Journal of Automated Reasoning, 61:1-4, (113-139), Online publication date: 1-Jun-2018.
  106. ACM
    Riesco A and Ogata K (2018). Prove it! Inferring Formal Proof Scripts from CafeOBJ Proof Scores, ACM Transactions on Software Engineering and Methodology, 27:2, (1-32), Online publication date: 30-Apr-2018.
  107. ACM
    Shapiro M, Bieniusa A, Zeller P and Petri G Ensuring referential integrity under causal consistency Proceedings of the 5th Workshop on the Principles and Practice of Consistency for Distributed Data, (1-5)
  108. Mateescu R (2018). Recent advances in interactive and automated analysis, International Journal on Software Tools for Technology Transfer (STTT), 20:2, (119-123), Online publication date: 1-Apr-2018.
  109. ACM
    Brandl F, Brandt F, Eberl M and Geist C (2018). Proving the Incompatibility of Efficiency and Strategyproofness via SMT Solving, Journal of the ACM, 65:2, (1-28), Online publication date: 8-Mar-2018.
  110. ACM
    Divasón J, Joosten S, Kunčar O, Thiemann R and Yamada A Efficient certification of complexity proofs: formalizing the Perron–Frobenius theorem (invited talk paper) Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, (2-13)
  111. ACM
    Amani S, Bégel M, Bortin M and Staples M Towards verifying ethereum smart contract bytecode in Isabelle/HOL Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, (66-77)
  112. ACM
    McLaughlin C, McKinna J and Stark I Triangulating context lemmas Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, (102-114)
  113. Brunner J and Lammich P (2018). Formal Verification of an Executable LTL Model Checker with Partial Order Reduction, Journal of Automated Reasoning, 60:1, (3-21), Online publication date: 1-Jan-2018.
  114. ACM
    Padon O, Losa G, Sagiv M and Shoham S (2017). Paxos made EPR: decidable reasoning about distributed protocols, Proceedings of the ACM on Programming Languages, 1:OOPSLA, (1-31), Online publication date: 12-Oct-2017.
  115. Verbeek F and van Vugt N Estimating worst-case latency of on-chip interconnects with formal simulation Proceedings of the 17th Conference on Formal Methods in Computer-Aided Design, (204-211)
  116. Chihani Z, Miller D and Renaud F (2017). A Semantic Framework for Proof Evidence, Journal of Automated Reasoning, 59:3, (287-330), Online publication date: 1-Oct-2017.
  117. ACM
    Bodeveix J, Filali-Amine M and Kan S A refinement-based compiler development for synchronous languages Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, (165-174)
  118. ACM
    Ribeiro R and Bois A Certified Bit-Coded Regular Expression Parsing Proceedings of the 21st Brazilian Symposium on Programming Languages, (1-8)
  119. Spichkova M and Simic M (2017). Human-centred analysis of the dependencies within sets of proofs, Procedia Computer Science, 112:C, (2290-2298), Online publication date: 1-Sep-2017.
  120. Clunne-Kiely L, Idicula B, Payne L, Ronggowarsito E, Spichkova M, Simic M and Schmidt H (2017). Modelling and Implementation of Humanoid Robot Behaviour, Procedia Computer Science, 112:C, (2249-2258), Online publication date: 1-Sep-2017.
  121. Kumar A and Pais A (2017). En-Route Filtering Techniques in Wireless Sensor Networks, Wireless Personal Communications: An International Journal, 96:1, (697-739), Online publication date: 1-Sep-2017.
  122. Blanchette J, Fleury M and Weidenbach C A verified SAT solver framework with learn, forget, restart and incrementality Proceedings of the 26th International Joint Conference on Artificial Intelligence, (4786-4790)
  123. Selsam D, Liang P and Dill D Developing bug-free machine learning systems with formal mathematics Proceedings of the 34th International Conference on Machine Learning - Volume 70, (3047-3056)
  124. Pinisetty S, Preoteasa V, Tripakis S, Jéron T, Falcone Y and Marchand H (2017). Predictive runtime enforcement, Formal Methods in System Design, 51:1, (154-199), Online publication date: 1-Aug-2017.
  125. ACM
    El Bakouny Y, Crolard T and Mezher D A Coq-based synthesis of Scala programs which are correct-by-construction Proceedings of the 19th Workshop on Formal Techniques for Java-like Programs, (1-2)
  126. ACM
    Kovács L, Robillard S and Voronkov A (2017). Coming to terms with quantified reasoning, ACM SIGPLAN Notices, 52:1, (260-270), Online publication date: 11-May-2017.
  127. ACM
    Madhavan R, Kulal S and Kuncak V (2017). Contract-based resource verification for higher-order functions with memoization, ACM SIGPLAN Notices, 52:1, (330-343), Online publication date: 11-May-2017.
  128. ACM
    Lampropoulos L, Gallois-Wong D, Hriţcu C, Hughes J, Pierce B and Xia L (2017). Beginner's luck: a language for property-based generators, ACM SIGPLAN Notices, 52:1, (114-129), Online publication date: 11-May-2017.
  129. Stratulat S (2017). Mechanically certifying formula-based Noetherian induction reasoning, Journal of Symbolic Computation, 80:P1, (209-249), Online publication date: 1-May-2017.
  130. Blanchette J, Waldmann U and Wand D A Lambda-Free Higher-Order RecursiveźPathźOrder Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures - Volume 10203, (461-479)
  131. Atzei N, Bartoletti M and Cimoli T A Survey of Attacks on Ethereum Smart Contracts SoK Proceedings of the 6th International Conference on Principles of Security and Trust - Volume 10204, (164-186)
  132. Aransay J and Divasón J (2017). A Formalisation in HOL of the Fundamental Theorem of Linear Algebra and Its Application to the Solution of the Least Squares Problem, Journal of Automated Reasoning, 58:4, (509-535), Online publication date: 1-Apr-2017.
  133. Zulkoski E, Bright C, Heinle A, Kotsireas I, Czarnecki K and Ganesh V (2017). Combining SAT Solvers with Computer Algebra Systems to Verify Combinatorial Conjectures, Journal of Automated Reasoning, 58:3, (313-339), Online publication date: 1-Mar-2017.
  134. Reynolds A and Blanchette J (2017). A Decision Procedure for (Co)datatypes in SMT Solvers, Journal of Automated Reasoning, 58:3, (341-362), Online publication date: 1-Mar-2017.
  135. Steffen B (2017). The physics of software tools, International Journal on Software Tools for Technology Transfer (STTT), 19:1, (1-7), Online publication date: 1-Feb-2017.
  136. ACM
    Amani S, Andronick J, Bortin M, Lewis C, Rizkallah C and Tuong J Complx: a verification framework for concurrent imperative programs Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs, (138-150)
  137. ACM
    Divasón J, Joosten S, Thiemann R and Yamada A A formalization of the Berlekamp-Zassenhaus factorization algorithm Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs, (17-29)
  138. ACM
    Bohrer R, Rahli V, Vukotic I, Völp M and Platzer A Formally verified differential dynamic logic Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs, (208-221)
  139. ACM
    Kovács L, Robillard S and Voronkov A Coming to terms with quantified reasoning Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (260-270)
  140. ACM
    Madhavan R, Kulal S and Kuncak V Contract-based resource verification for higher-order functions with memoization Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (330-343)
  141. ACM
    Lampropoulos L, Gallois-Wong D, Hriţcu C, Hughes J, Pierce B and Xia L Beginner's luck: a language for property-based generators Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (114-129)
  142. Blanchette J, Popescu A and Traytel D (2017). Soundness and Completeness Proofs by Coinductive Methods, Journal of Automated Reasoning, 58:1, (149-179), Online publication date: 1-Jan-2017.
  143. Ströder T, Giesl J, Brockschmidt M, Frohn F, Fuhs C, Hensel J, Schneider-Kamp P and Aschermann C (2017). Automatically Proving Termination and Memory Safety for Programs with Pointer Arithmetic, Journal of Automated Reasoning, 58:1, (33-65), Online publication date: 1-Jan-2017.
  144. Giesl J, Aschermann C, Brockschmidt M, Emmes F, Frohn F, Fuhs C, Hensel J, Otto C, Plücker M, Schneider-Kamp P, Ströder T, Swiderski S and Thiemann R (2017). Analyzing Program Termination and Complexity Automatically with AProVE, Journal of Automated Reasoning, 58:1, (3-31), Online publication date: 1-Jan-2017.
  145. ACM
    Beaumont M, McCarthy J and Murray T The cross domain desktop compositor Proceedings of the 32nd Annual Conference on Computer Security Applications, (533-545)
  146. Esparza J, Křetínský J and Sickert S (2016). From LTL to deterministic automata, Formal Methods in System Design, 49:3, (219-271), Online publication date: 1-Dec-2016.
  147. You Z, Xue J and Zuo Z (2016). Unified formal derivation and automatic verification of three binary-tree traversal non-recursive algorithms, Cluster Computing, 19:4, (2145-2156), Online publication date: 1-Dec-2016.
  148. ACM
    Schubert A, Urzyczyn P and Walukiewicz-Chrząszcz D (2016). How Hard Is Positive Quantification?, ACM Transactions on Computational Logic, 17:4, (1-29), Online publication date: 15-Nov-2016.
  149. ACM
    Furusawa H and Struth G (2016). Taming Multirelations, ACM Transactions on Computational Logic, 17:4, (1-34), Online publication date: 15-Nov-2016.
  150. ACM
    Kammueller F, Kerber M and Probst C Towards Formal Analysis of Insider Threats for Auctions Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, (23-34)
  151. ACM
    Grewe S VeriTaS: verification of type system specifications: mechanizing domain knowledge about progress and preservation proofs Companion Proceedings of the 2016 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity, (12-14)
  152. Blanchette J, Greenaway D, Kaliszyk C, Kühlwein D and Urban J (2016). A Learning-Based Fact Selector for Isabelle/HOL, Journal of Automated Reasoning, 57:3, (219-244), Online publication date: 1-Oct-2016.
  153. ACM
    O'Connor L Applications of applicative proof search Proceedings of the 1st International Workshop on Type-Driven Development, (43-55)
  154. ACM
    Grewe S, Erdweg S, Raulf M and Mezini M Exploration of language specifications by compilation to first-order logic Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, (104-117)
  155. ACM
    Hentschel M, Hähnle R and Bubel R An empirical evaluation of two user interfaces of an interactive program verifier Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (403-413)
  156. ACM
    Padon O, McMillan K, Panda A, Sagiv M and Shoham S (2016). Ivy: safety verification by interactive generalization, ACM SIGPLAN Notices, 51:6, (614-630), Online publication date: 1-Aug-2016.
  157. ACM
    Dongol B, Hayes I and Struth G (2016). Convolution as a Unifying Concept, ACM Transactions on Computational Logic, 17:3, (1-25), Online publication date: 22-Jul-2016.
  158. Benzmüller C and Paleo B The inconsistency in Gödel's ontological argument Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (936-942)
  159. ACM
    Preoteasa V and Tripakis S Towards Compositional Feedback in Non-Deterministic and Non-Input-Receptive Systems Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, (768-777)
  160. Blanchette J, Fleury M and Weidenbach C A Verified SAT Solver Framework with Learn, Forget, Restart, and Incrementality Proceedings of the 8th International Joint Conference on Automated Reasoning - Volume 9706, (25-44)
  161. Wisniewski M, Steen A, Kern K and Benzmüller C Effective Normalization Techniques for HOL Proceedings of the 8th International Joint Conference on Automated Reasoning - Volume 9706, (362-370)
  162. Rizaldi A, Immler F and Althoff M A Formally Verified Checker of the Safe Distance Traffic Rules for Autonomous Vehicles Proceedings of the 8th International Symposium on NASA Formal Methods - Volume 9690, (175-190)
  163. ACM
    Padon O, McMillan K, Panda A, Sagiv M and Shoham S Ivy: safety verification by interactive generalization Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, (614-630)
  164. Aiguier M, Arnould A, Gall P and Longuet D (2016). Exhaustive test sets for algebraic specifications, Software Testing, Verification & Reliability, 26:4, (294-317), Online publication date: 1-Jun-2016.
  165. ACM
    Pinisetty S, Preoteasa V, Tripakis S, Jéron T, Falcone Y and Marchand H Predictive runtime enforcement Proceedings of the 31st Annual ACM Symposium on Applied Computing, (1628-1633)
  166. Åman Pohjola J and Parrow J The Expressive Power of Monotonic Parallel Composition Proceedings of the 25th European Symposium on Programming Languages and Systems - Volume 9632, (780-803)
  167. Wang Y and Nadathur G A Higher-Order Abstract Syntax Approach to Verified Transformations on Functional Programs Proceedings of the 25th European Symposium on Programming Languages and Systems - Volume 9632, (752-779)
  168. Zhao Y, Sanán D, Zhang F and Liu Y Reasoning About Information Flow Security of Separation Kernels with Channel-Based Communication Proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 9636, (791-810)
  169. Lochbihler A Probabilistic Functions and Cryptographic Oracles in Higher Order Logic Proceedings of the 25th European Symposium on Programming Languages and Systems - Volume 9632, (503-531)
  170. Blanchette J, Böhme S, Fleury M, Smolka S and Steckermeier A (2016). Semi-intelligible Isar Proofs from Machine-Generated Proofs, Journal of Automated Reasoning, 56:2, (155-200), Online publication date: 1-Feb-2016.
  171. ACM
    Elliott T, Pike L, Winwood S, Hickey P, Bielman J, Sharp J, Seidel E and Launchbury J (2015). Guilt free ivory, ACM SIGPLAN Notices, 50:12, (189-200), Online publication date: 28-Jan-2016.
  172. ACM
    Breitner J (2015). Formally proving a compiler transformation safe, ACM SIGPLAN Notices, 50:12, (35-46), Online publication date: 28-Jan-2016.
  173. ACM
    Åman Pohjola J and Parrow J Bisimulation up-to techniques for psi-calculi Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, (142-153)
  174. ACM
    Fulton N and Platzer A A logic of proofs for differential dynamic logic: toward independently checkable proof certificates for dynamic logics Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, (110-121)
  175. ACM
    Li W and Paulson L A modular, efficient formalisation of real algebraic numbers Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, (66-75)
  176. ACM
    Thiemann R and Yamada A Formalizing Jordan normal forms in Isabelle/HOL Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, (88-99)
  177. ACM
    Bernard S, Bertot Y, Rideau L and Strub P Formal proofs of transcendence for e and pi as an application of multivariate and symmetric polynomials Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, (76-87)
  178. ACM
    Kotelnikov E, Kovács L, Reger G and Voronkov A The vampire and the FOOL Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, (37-48)
  179. Draheim D Reflective Constraint Writing Special Issue on Database- and Expert-Systems Applications on Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIV - Volume 9510, (1-60)
  180. ACM
    Wickerson J, Batty M, Beckmann B and Donaldson A (2015). Remote-scope promotion: clarified, rectified, and verified, ACM SIGPLAN Notices, 50:10, (731-747), Online publication date: 18-Dec-2015.
  181. ACM
    Blanchette J, Popescu A and Traytel D (2015). Foundational extensible corecursion: a proof assistant perspective, ACM SIGPLAN Notices, 50:9, (192-204), Online publication date: 18-Dec-2015.
  182. Teichel K, Sibold D and Milius S First Results of a Formal Analysis of the Network Time Security Specification Proceedings of the Second International Conference on Security Standardisation Research - Volume 9497, (218-245)
  183. ACM
    Leino K and Lucio P (2015). An Assertional Proof of the Stability and Correctness of Natural Mergesort, ACM Transactions on Computational Logic, 17:1, (1-22), Online publication date: 10-Dec-2015.
  184. ACM
    Furusawa H and Struth G (2015). Concurrent Dynamic Algebra, ACM Transactions on Computational Logic, 16:4, (1-38), Online publication date: 19-Nov-2015.
  185. ACM
    Wickerson J, Batty M, Beckmann B and Donaldson A Remote-scope promotion: clarified, rectified, and verified Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (731-747)
  186. Déharbe D and Merz S Software Component Design with the B Method -- A Formalization in Isabelle/HOL Revised Selected Papers of the 12th International Conference on Formal Aspects of Component Software - Volume 9539, (31-47)
  187. Amálio N, de Lara J and Guerra E Fragmenta Proceedings of the 18th International Conference on Model Driven Engineering Languages and Systems, (106-115)
  188. Adams M Refactoring Proofs with Tactician Revised Selected Papers of the SEFM 2015 Collocated Workshops on Software Engineering and Formal Methods - Volume 9509, (53-67)
  189. Debois S, Hildebrandt T and Slaats T Concurrency and Asynchrony in Declarative Workflows Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (72-89)
  190. ACM
    Elliott T, Pike L, Winwood S, Hickey P, Bielman J, Sharp J, Seidel E and Launchbury J Guilt free ivory Proceedings of the 2015 ACM SIGPLAN Symposium on Haskell, (189-200)
  191. ACM
    Breitner J Formally proving a compiler transformation safe Proceedings of the 2015 ACM SIGPLAN Symposium on Haskell, (35-46)
  192. ACM
    Blanchette J, Popescu A and Traytel D Foundational extensible corecursion: a proof assistant perspective Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming, (192-204)
  193. Kotelnikov E, Kovács L and Voronkov A A First Class Boolean Sort in First-Order Theorem Proving and TPTP Proceedings of the International Conference on Intelligent Computer Mathematics - Volume 9150, (71-86)
  194. ACM
    Murray T Short Paper Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, (43-48)
  195. ACM
    Betts A, Chong N, Donaldson A, Ketema J, Qadeer S, Thomson P and Wickerson J (2015). The Design and Implementation of a Verification Technique for GPU Kernels, ACM Transactions on Programming Languages and Systems, 37:3, (1-49), Online publication date: 18-Jun-2015.
  196. ACM
    Voirol N, Kneuss E and Kuncak V Counter-example complete verification for higher-order functions Proceedings of the 6th ACM SIGPLAN Symposium on Scala, (18-29)
  197. Zheng X and Julien C Verification and validation in cyber physical systems Proceedings of the First International Workshop on Software Engineering for Smart Cyber-Physical Systems, (15-18)
  198. Matichuk D, Murray T, Andronick J, Jeffery R, Klein G and Staples M Empirical study towards a leading indicator for cost of formal software verification Proceedings of the 37th International Conference on Software Engineering - Volume 1, (722-732)
  199. ACM
    Blanchette J, Hupel L, Nipkow T, Noschinski L and Traytel D (2014). Experience report, ACM SIGPLAN Notices, 49:12, (25-30), Online publication date: 11-May-2015.
  200. Popescu A and Roşu G (2015). Term-generic logic, Theoretical Computer Science, 577:C, (1-24), Online publication date: 27-Apr-2015.
  201. ACM
    Buday G Formalising the SECD machine with nominal Isabelle Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1823-1824)
  202. Martina J and Paulson L (2015). Verifying multicast-based security protocols using the inductive method, International Journal of Information Security, 14:2, (187-204), Online publication date: 1-Apr-2015.
  203. ACM
    Ciabattoni A, Lahav O, Spendier L and Zamansky A (2014). Taming Paraconsistent (and Other) Logics, ACM Transactions on Computational Logic, 16:1, (1-23), Online publication date: 1-Mar-2015.
  204. Foster S and Struth G (2015). On the Fine-Structure of Regular Algebra, Journal of Automated Reasoning, 54:2, (165-197), Online publication date: 1-Feb-2015.
  205. ACM
    Lammich P and Neumann R A Framework for Verifying Depth-First Search Algorithms Proceedings of the 2015 Conference on Certified Programs and Proofs, (137-146)
  206. ACM
    Immler F A Verified Algorithm for Geometric Zonotope/Hyperplane Intersection Proceedings of the 2015 Conference on Certified Programs and Proofs, (129-136)
  207. ACM
    Preoteasa V and Tripakis S Refinement calculus of reactive systems Proceedings of the 14th International Conference on Embedded Software, (1-10)
  208. Hawblitzel C, Howell J, Lorch J, Narayan A, Parno B, Zhang D and Zill B Ironclad apps Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation, (165-181)
  209. TESL Proceedings of the Twelfth ACM/IEEE Conference on Formal Methods and Models for Codesign, (114-123)
  210. ACM
    Staples M, Jeffery R, Andronick J, Murray T, Klein G and Kolanski R Productivity for proof engineering Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-4)
  211. ACM
    Molotnikov Z, Völter M and Ratiu D Automated domain-specific C verification with mbeddr Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, (539-550)
  212. ACM
    Aoto T and Stratulat S Decision Procedures for Proving Inductive Theorems without Induction Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming, (237-248)
  213. ACM
    Blanchette J, Hupel L, Nipkow T, Noschinski L and Traytel D Experience report Proceedings of the 2014 ACM SIGPLAN symposium on Haskell, (25-30)
  214. ACM
    Bahr P Composing and decomposing data types Proceedings of the 10th ACM SIGPLAN workshop on Generic programming, (71-82)
  215. Gaspar N, Henrio L and Madelaine E (2014). Bringing Coq into the World of GCM Distributed Applications, International Journal of Parallel Programming, 42:4, (643-662), Online publication date: 1-Aug-2014.
  216. Guo H and Subramaniam M (2014). Model-based test generation using extended symbolic grammars, International Journal on Software Tools for Technology Transfer (STTT), 16:4, (437-455), Online publication date: 1-Aug-2014.
  217. Ferreira J, Gherghina C, He G, Qin S and Chin W (2014). Automated verification of the FreeRTOS scheduler in Hip/Sleek, International Journal on Software Tools for Technology Transfer (STTT), 16:4, (381-397), Online publication date: 1-Aug-2014.
  218. ACM
    Paulson L Automated theorem proving for special functions Proceedings of the 2014 Symposium on Symbolic-Numeric Computation, (3-8)
  219. ACM
    Thüm T, Apel S, Kästner C, Schaefer I and Saake G (2014). A Classification and Survey of Analysis Strategies for Software Product Lines, ACM Computing Surveys, 47:1, (1-45), Online publication date: 1-Jul-2014.
  220. ACM
    Greenaway D, Lim J, Andronick J and Klein G Don't sweat the small stuff Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, (429-439)
  221. ACM
    Greenaway D, Lim J, Andronick J and Klein G (2014). Don't sweat the small stuff, ACM SIGPLAN Notices, 49:6, (429-439), Online publication date: 5-Jun-2014.
  222. ACM
    Visser W, Bjørner N and Shankar N Software engineering and automated deduction Future of Software Engineering Proceedings, (155-166)
  223. Bartels B and Jähnig N Mechanized, Compositional Verification of Low-Level Code Proceedings of the 6th International Symposium on NASA Formal Methods - Volume 8430, (98-112)
  224. Noschinski L, Rizkallah C and Mehlhorn K Verification of Certifying Computations through AutoCorres and Simpl Proceedings of the 6th International Symposium on NASA Formal Methods - Volume 8430, (46-61)
  225. Groce A, Havelund K, Holzmann G, Joshi R and Xu R (2014). Establishing flight software reliability, Annals of Mathematics and Artificial Intelligence, 70:4, (315-349), Online publication date: 1-Apr-2014.
  226. Felgenhauer B and Thiemann R Reachability Analysis with State-Compatible Automata Proceedings of the 8th International Conference on Language and Automata Theory and Applications - Volume 8370, (347-359)
  227. ACM
    Zaccai D, Tagore A, Hoffman D, Kirschenbaum J, Bainazarov Z, Friedman H, Pearl D and Weide B Syrus Proceedings of the 45th ACM technical symposium on Computer science education, (61-66)
  228. ACM
    Moscato M, Pombo C and Frias M (2014). Dynamite, ACM Transactions on Software Engineering and Methodology, 23:2, (1-37), Online publication date: 1-Mar-2014.
  229. Alkassar E, Böhme S, Mehlhorn K and Rizkallah C (2014). A Framework for the Verification of Certifying Computations, Journal of Automated Reasoning, 52:3, (241-273), Online publication date: 1-Mar-2014.
  230. ACM
    Welch D, Cook C, Sun Y and Sitaraman M A web-integrated verifying compiler for RESOLVE Proceedings of the 7th India Software Engineering Conference, (1-6)
  231. ACM
    Klein G, Andronick J, Elphinstone K, Murray T, Sewell T, Kolanski R and Heiser G (2014). Comprehensive formal verification of an OS microkernel, ACM Transactions on Computer Systems, 32:1, (1-70), Online publication date: 1-Feb-2014.
  232. Macedonio D and Merro M (2014). A semantic analysis of key management protocols for wireless sensor networks, Science of Computer Programming, 81, (53-78), Online publication date: 1-Feb-2014.
  233. Alama J, Heskes T, Kühlwein D, Tsivtsivadze E and Urban J (2014). Premise Selection for Mathematics by Corpus Analysis and Kernel Methods, Journal of Automated Reasoning, 52:2, (191-213), Online publication date: 1-Feb-2014.
  234. ACM
    Bodin M, Chargueraud A, Filaretti D, Gardner P, Maffeis S, Naudziuniene D, Schmitt A and Smith G (2014). A trusted mechanised JavaScript specification, ACM SIGPLAN Notices, 49:1, (87-100), Online publication date: 13-Jan-2014.
  235. ACM
    Bodin M, Chargueraud A, Filaretti D, Gardner P, Maffeis S, Naudziuniene D, Schmitt A and Smith G A trusted mechanised JavaScript specification Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (87-100)
  236. Schropp A and Popescu A Nonfree Datatypes in Isabelle/HOL Proceedings of the Third International Conference on Certified Programs and Proofs - Volume 8307, (114-130)
  237. ACM
    Lochbihler A (2014). Making the java memory model safe, ACM Transactions on Programming Languages and Systems, 35:4, (1-65), Online publication date: 1-Dec-2013.
  238. Sternagel C (2013). Proof Pearl--A Mechanized Proof of GHC's Mergesort, Journal of Automated Reasoning, 51:4, (357-370), Online publication date: 1-Dec-2013.
  239. ACM
    Traytel D and Nipkow T (2013). Verified decision procedures for MSO on words based on derivatives of regular expressions, ACM SIGPLAN Notices, 48:9, (3-12), Online publication date: 12-Nov-2013.
  240. ACM
    Kneuss E, Kuraj I, Kuncak V and Suter P (2013). Synthesis modulo recursive functions, ACM SIGPLAN Notices, 48:10, (407-426), Online publication date: 12-Nov-2013.
  241. ACM
    Fernandez M, Kuz I, Klein G and Andronick J Towards a verified component platform Proceedings of the Seventh Workshop on Programming Languages and Operating Systems, (1-7)
  242. ACM
    van Glabbeek R, Höfner P, Tan W and Portmann M Sequence numbers do not guarantee loop freedom Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems, (91-100)
  243. ACM
    Gammie P (2013). Synchronous digital circuits as functional programs, ACM Computing Surveys, 46:2, (1-27), Online publication date: 1-Nov-2013.
  244. ACM
    Kneuss E, Kuraj I, Kuncak V and Suter P Synthesis modulo recursive functions Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications, (407-426)
  245. ACM
    Fast E, Lee C, Aiken A, Bernstein M, Koller D and Smith E Crowd-scale interactive formal reasoning and analytics Proceedings of the 26th annual ACM symposium on User interface software and technology, (363-372)
  246. ACM
    Traytel D and Nipkow T Verified decision procedures for MSO on words based on derivatives of regular expressions Proceedings of the 18th ACM SIGPLAN international conference on Functional programming, (3-12)
  247. Saleh I, Kulczycki G, Blake M and Wei Y Static Detection of Implementation Errors Using Formal Code Specification Proceedings of the 11th International Conference on Software Engineering and Formal Methods - Volume 8137, (197-211)
  248. ACM
    Jedynak W, Biernacka M and Biernacki D An operational foundation for the tactic language of Coq Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, (25-36)
  249. ACM
    Pham T and Whalen M RADA: a tool for reasoning about algebraic data types with abstractions Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, (611-614)
  250. Kühlwein D, Blanchette J, Kaliszyk C and Urban J MaSh Proceedings of the 4th international conference on Interactive Theorem Proving, (35-50)
  251. Esparza J, Lammich P, Neumann R, Nipkow T, Schimpf A and Smaus J A Fully Verified Executable LTL Model Checker Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (463-478)
  252. Dai L, Xia B and Zhan N Generating Non-linear Interpolants by Semidefinite Programming Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (364-380)
  253. ACM
    Blanc R, Kuncak V, Kneuss E and Suter P An overview of the Leon verification system Proceedings of the 4th Workshop on Scala, (1-10)
  254. ACM
    Sewell T, Myreen M and Klein G (2013). Translation validation for a verified OS kernel, ACM SIGPLAN Notices, 48:6, (471-482), Online publication date: 23-Jun-2013.
  255. ACM
    Qiu X, Garg P, Ştefănescu A and Madhusudan P (2013). Natural proofs for structure, data, and separation, ACM SIGPLAN Notices, 48:6, (231-242), Online publication date: 23-Jun-2013.
  256. ACM
    Sewell T, Myreen M and Klein G Translation validation for a verified OS kernel Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, (471-482)
  257. ACM
    Qiu X, Garg P, Ştefănescu A and Madhusudan P Natural proofs for structure, data, and separation Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, (231-242)
  258. Staples M, Kolanski R, Klein G, Lewis C, Andronick J, Murray T, Jeffery R and Bass L Formal specifications better than function points for code sizing Proceedings of the 2013 International Conference on Software Engineering, (1257-1260)
  259. Bongiovanni F and Henrio L A mechanized model for CAN protocols Proceedings of the 16th international conference on Fundamental Approaches to Software Engineering, (266-281)
  260. Blanchette J, Böhme S, Popescu A and Smallbone N Encoding monomorphic and polymorphic types Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (493-507)
  261. ACM
    Ludwich M and Fröhlich A (2013). On the formal verification of component-based embedded operating systems, ACM SIGOPS Operating Systems Review, 47:1, (28-34), Online publication date: 29-Jan-2013.
  262. Meier S, Cremers C and Basin D (2013). Efficient construction of machine-checked symbolic protocol security proofs, Journal of Computer Security, 21:1, (41-87), Online publication date: 1-Jan-2013.
  263. Urban J and Vyskočil J Theorem proving in large formal mathematics as an emerging AI field Automated Reasoning and Mathematics, (240-257)
  264. Murray T, Matichuk D, Brassil M, Gammie P and Klein G Noninterference for operating system kernels Proceedings of the Second international conference on Certified Programs and Proofs, (126-142)
  265. Bulwahn L The new quickcheck for isabelle Proceedings of the Second international conference on Certified Programs and Proofs, (92-108)
  266. ACM
    Huffman B (2012). Formal verification of monad transformers, ACM SIGPLAN Notices, 47:9, (15-16), Online publication date: 15-Oct-2012.
  267. Djeddai S, Strecker M and Mezghiche M Integrating a formal development for DSLs into meta-modeling Proceedings of the 2nd international conference on Model and Data Engineering, (55-66)
  268. ACM
    Brucker A and Wolff B Featherweight OCL Proceedings of the 12th Workshop on OCL and Textual Modelling, (19-24)
  269. Küfner P, Nestmann U and Rickmann C Formal verification of distributed algorithms Proceedings of the 7th IFIP TC 1/WG 202 international conference on Theoretical Computer Science, (209-224)
  270. Sánchez-Gil L, Hidalgo-Herrero M and Ortega-Mallén Y A locally nameless representation for a natural semantics for lazy evaluation Proceedings of the 9th international conference on Theoretical Aspects of Computing, (105-119)
  271. ACM
    Huffman B Formal verification of monad transformers Proceedings of the 17th ACM SIGPLAN international conference on Functional programming, (15-16)
  272. Lawrence A, Berger U and Seisenberger M (2012). Extracting a DPLL Algorithm, Electronic Notes in Theoretical Computer Science (ENTCS), 286, (243-256), Online publication date: 1-Sep-2012.
  273. Chin W, David C, Nguyen H and Qin S (2012). Automated verification of shape, size and bag properties via user-defined predicates in separation logic, Science of Computer Programming, 77:9, (1006-1036), Online publication date: 1-Aug-2012.
  274. ACM
    Baresi L, Morzenti A, Motta A and Rossi M (2012). A logic-based semantics for the verification of multi-diagram UML models, ACM SIGSOFT Software Engineering Notes, 37:4, (1-8), Online publication date: 16-Jul-2012.
  275. Horozal F, Kohlhase M and Rabe F Extending MKM formats at the statement level Proceedings of the 11th international conference on Intelligent Computer Mathematics, (65-80)
  276. Bourke T, Daum M, Klein G and Kolanski R Challenges and experiences in managing large-scale proofs Proceedings of the 11th international conference on Intelligent Computer Mathematics, (32-48)
  277. Marić F, Živković M and Vučković B Formalizing frankl's conjecture Proceedings of the 11th international conference on Intelligent Computer Mathematics, (248-263)
  278. Hoare T and van Staden S (2012). In praise of algebra, Formal Aspects of Computing, 24:4-6, (423-431), Online publication date: 1-Jul-2012.
  279. Traytel D, Popescu A and Blanchette J Foundational, Compositional (Co)datatypes for Higher-Order Logic Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer Science, (596-605)
  280. ACM
    Dietl W, Dietzel S, Ernst M, Mote N, Walker B, Cooper S, Pavlik T and Popović Z Verification games Proceedings of the 14th Workshop on Formal Techniques for Java-like Programs, (42-49)
  281. Zhang H, Klein G, Staples M, Andronick J, Zhu L and Kolanski R Simulation modeling of a large-scale formal verification process Proceedings of the International Conference on Software and System Process, (3-12)
  282. Cook C, Harton H, Smith H and Sitaraman M Specification engineering and modular verification using a web-integrated verifying compiler Proceedings of the 34th International Conference on Software Engineering, (1379-1382)
  283. Andronick J, Jeffery R, Klein G, Kolanski R, Staples M, Zhang H and Zhu L Large-scale formal verification in practice: a process perspective Proceedings of the 34th International Conference on Software Engineering, (1002-1011)
  284. de Oliveira D, Déharbe D and Fontaine P (2012). Combining decision procedures by (model-)equality propagation, Science of Computer Programming, 77:4, (518-532), Online publication date: 1-Apr-2012.
  285. Lochbihler A Java and the java memory model -- a unified, machine-checked formalisation Proceedings of the 21st European conference on Programming Languages and Systems, (497-517)
  286. Basin D, Cremers C and Meier S Provably repairing the ISO/IEC 9798 standard for entity authentication Proceedings of the First international conference on Principles of Security and Trust, (129-148)
  287. Karunamurthy R, Khendek F and Glitho R (2012). A novel architecture for Web service composition, Journal of Network and Computer Applications, 35:2, (787-802), Online publication date: 1-Mar-2012.
  288. Wies T, Muñiz M and Kuncak V Deciding functional lists with sublist sets Proceedings of the 4th international conference on Verified Software: theories, tools, experiments, (66-81)
  289. Feliachi A, Gaudel M and Wolff B Isabelle/circus Proceedings of the 4th international conference on Verified Software: theories, tools, experiments, (243-260)
  290. ACM
    Stampoulis A and Shao Z Static and user-extensible proof checking Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (273-284)
  291. ACM
    Kimmell G, Stump A, Eades H, Fu P, Sheard T, Weirich S, Casinghino C, Sjöberg V, Collins N and Ahn K Equational reasoning about programs with general recursion and call-by-value semantics Proceedings of the sixth workshop on Programming languages meets program verification, (15-26)
  292. ACM
    Stampoulis A and Shao Z (2012). Static and user-extensible proof checking, ACM SIGPLAN Notices, 47:1, (273-284), Online publication date: 18-Jan-2012.
  293. Heidarian F, Schmaltz J and Vaandrager F (2012). Analysis of a clock synchronization protocol for wireless sensor networks, Theoretical Computer Science, 413:1, (87-105), Online publication date: 1-Jan-2012.
  294. Felty A and Momigliano A (2012). Hybrid, Journal of Automated Reasoning, 48:1, (43-105), Online publication date: 1-Jan-2012.
  295. ACM
    Dietl W, Drossopoulou S and Müller P (2012). Separating ownership topology and encapsulation with generic universe types, ACM Transactions on Programming Languages and Systems, 33:6, (1-62), Online publication date: 1-Dec-2011.
  296. Hirokawa N and Middeldorp A (2011). Decreasing Diagrams and Relative Termination, Journal of Automated Reasoning, 47:4, (481-501), Online publication date: 1-Dec-2011.
  297. Blanchette J and Krauss A (2011). Monotonicity Inference for Higher-Order Formulas, Journal of Automated Reasoning, 47:4, (369-398), Online publication date: 1-Dec-2011.
  298. Schmalz M Term rewriting in logics of partial functions Proceedings of the 13th international conference on Formal methods and software engineering, (633-650)
  299. Maclean E and Ireland A Mutation in linked data structures Proceedings of the 13th international conference on Formal methods and software engineering, (275-290)
  300. ACM
    David C and Chin W Immutable specifications for more concise and precise verification Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications, (359-374)
  301. ACM
    David C and Chin W (2011). Immutable specifications for more concise and precise verification, ACM SIGPLAN Notices, 46:10, (359-374), Online publication date: 18-Oct-2011.
  302. Charron-Bost B, Debrat H and Merz S Formal verification of consensus algorithms tolerating malicious faults Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems, (120-134)
  303. Sternagel C and Thiemann R Generalized and formalized uncurrying Proceedings of the 8th international conference on Frontiers of combining systems, (243-258)
  304. Bobot F and Paskevich A Expressing polymorphic types in a many-sorted language Proceedings of the 8th international conference on Frontiers of combining systems, (87-102)
  305. Blanchette J, Bulwahn L and Nipkow T Automatic proof and disproof in Isabelle/HOL Proceedings of the 8th international conference on Frontiers of combining systems, (12-27)
  306. Weber T (2011). SMT solvers, International Journal on Software Tools for Technology Transfer (STTT), 13:5, (419-429), Online publication date: 1-Oct-2011.
  307. Chaieb A (2011). Formal Power Series, Journal of Automated Reasoning, 47:3, (291-318), Online publication date: 1-Oct-2011.
  308. Johansson M, Dixon L and Bundy A (2011). Conjecture Synthesis for Inductive Theories, Journal of Automated Reasoning, 47:3, (251-289), Online publication date: 1-Oct-2011.
  309. Preoteasa V Algebra of monotonic boolean transformers Proceedings of the 14th Brazilian conference on Formal Methods: foundations and Applications, (140-155)
  310. ACM
    Popescu A and Gunter E Recursion principles for syntax with bindings and substitution Proceedings of the 16th ACM SIGPLAN international conference on Functional programming, (346-358)
  311. ACM
    Popescu A and Gunter E (2011). Recursion principles for syntax with bindings and substitution, ACM SIGPLAN Notices, 46:9, (346-358), Online publication date: 18-Sep-2011.
  312. Suter P, Köksal A and Kuncak V Satisfiability modulo recursive programs Proceedings of the 18th international conference on Static analysis, (298-315)
  313. ACM
    Basin D, Capkun S, Schaller P and Schmidt B (2011). Formal Reasoning about Physical Properties of Security Protocols, ACM Transactions on Information and System Security, 14:2, (1-28), Online publication date: 1-Sep-2011.
  314. Nipkow T Verified efficient enumeration of plane graphs modulo isomorphism Proceedings of the Second international conference on Interactive theorem proving, (281-296)
  315. Krauss A, Sternagel C, Thiemann R, Fuhs C and Giesl J Termination of Isabelle functions via termination of rewriting Proceedings of the Second international conference on Interactive theorem proving, (152-167)
  316. Gammie P Verified synthesis of knowledge-based programs in finite synchronous environments Proceedings of the Second international conference on Interactive theorem proving, (87-102)
  317. Böhme S and Moskal M Heaps and data structures Proceedings of the 23rd international conference on Automated deduction, (177-191)
  318. Blanchette J, Böhme S and Paulson L Extending Sledgehammer with SMT solvers Proceedings of the 23rd international conference on Automated deduction, (116-130)
  319. ACM
    Blanchette J, Weber T, Batty M, Owens S and Sarkar S Nitpicking c++ concurrency Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming, (113-124)
  320. Krebbers R and Wiedijk F A formalization of the C99 standard in HOL, isabelle and Coq Proceedings of the 18th Calculemus and 10th international conference on Intelligent computer mathematics, (301-303)
  321. Qin S, Luo C, Chin W and He G Automatically refining partial specifications for program verification Proceedings of the 17th international conference on Formal methods, (369-385)
  322. De Dios J and Peña R Certification of safe polynomial memory bounds Proceedings of the 17th international conference on Formal methods, (184-199)
  323. Li G Validated compilation through logic Proceedings of the 17th international conference on Formal methods, (169-183)
  324. ACM
    Brucker A, Brügger L, Kearney P and Wolff B An approach to modular and testable security models of real-world health-care applications Proceedings of the 16th ACM symposium on Access control models and technologies, (133-142)
  325. Foster S, Struth G and Weber T Automated engineering of relational and algebraic methods in isabelle/hol Proceedings of the 12th international conference on Relational and algebraic methods in computer science, (52-67)
  326. ACM
    Bartels B and Kleine M A CSP-based framework for the specification, verification, and implementation of adaptive systems Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (158-167)
  327. del Vado Vírseda R (2011). A Theoretical Framework for the Higher-Order Cooperation of Numeric Constraint Domains, Electronic Notes in Theoretical Computer Science (ENTCS), 269:C, (55-69), Online publication date: 22-Apr-2011.
  328. de Moura F, Barbosa A, Ayala-Rincón M and Kamareddine F (2011). A Flexible Framework for Visualisation of Computational Properties of General Explicit Substitutions Calculi, Electronic Notes in Theoretical Computer Science (ENTCS), 269:C, (41-54), Online publication date: 22-Apr-2011.
  329. Foster S and Struth G Integrating an automated theorem prover into agda Proceedings of the Third international conference on NASA Formal methods, (116-130)
  330. Dietrich D, Schröder L and Schulz E Formalizing and operationalizing industrial standards Proceedings of the 14th international conference on Fundamental approaches to software engineering: part of the joint European conferences on theory and practice of software, (81-95)
  331. ACM
    Back R and Preoteasa V Semantics and proof rules of invariant based programs Proceedings of the 2011 ACM Symposium on Applied Computing, (1658-1665)
  332. Blech J and Grégoire B (2011). Certifying compilers using higher-order theorem provers as certificate checkers, Formal Methods in System Design, 38:1, (33-61), Online publication date: 1-Feb-2011.
  333. Owre S and Shankar N Solving the first verified software competition problems using PVS Formal modeling, (315-328)
  334. ACM
    Urban C, Cheney J and Berghofer S (2011). Mechanizing the metatheory of LF, ACM Transactions on Computational Logic, 12:2, (1-42), Online publication date: 1-Jan-2011.
  335. ACM
    Adler R, Schaefer I, Trapp M and Poetzsch-Heffter A (2011). Component-based modeling and verification of dynamic adaptation in safety-critical embedded systems, ACM Transactions on Embedded Computing Systems, 10:2, (1-39), Online publication date: 1-Dec-2010.
  336. Miller D Reasoning about computations using two-levels of logic Proceedings of the 8th Asian conference on Programming languages and systems, (34-46)
  337. Feliachi A, Gaudel M and Wolff B Unifying theories in Isabelle/HOL Proceedings of the Third international conference on Unifying theories of programming, (188-206)
  338. Butterfield A Saoithín Proceedings of the Third international conference on Unifying theories of programming, (137-156)
  339. Montano-Rivas O, McCasland R, Dixon L and Bundy A Scheme-based synthesis of inductive theories Proceedings of the 9th Mexican international conference on Advances in artificial intelligence: Part I, (348-361)
  340. Böhm P A framework for incremental modelling and verification of on-chip protocols Proceedings of the 2010 Conference on Formal Methods in Computer-Aided Design, (159-166)
  341. ACM
    Roberson M and Boyapati C (2010). Efficient modular glass box software model checking, ACM SIGPLAN Notices, 45:10, (4-21), Online publication date: 17-Oct-2010.
  342. ACM
    Roberson M and Boyapati C Efficient modular glass box software model checking Proceedings of the ACM international conference on Object oriented programming systems languages and applications, (4-21)
  343. De Dios J, Montenegro M and Peña R Certified absence of dangling pointers in a language with explicit deallocation Proceedings of the 8th international conference on Integrated formal methods, (305-319)
  344. Daum M, Schirmer N and Schmidt M From operating-system correctness to pervasively verified applications Proceedings of the 8th international conference on Integrated formal methods, (105-120)
  345. Papapanagiotou P and Fleuriot J An Isabelle-like procedural mode for HOL light Proceedings of the 17th international conference on Logic for programming, artificial intelligence, and reasoning, (565-580)
  346. ACM
    Heiser G, Andronick J, Elphinstone K, Klein G, Kuz I and Ryzhyk L The road to trustworthy systems Proceedings of the fifth ACM workshop on Scalable trusted computing, (3-10)
  347. ACM
    Sprenger C and Basin D Developing security protocols by refinement Proceedings of the 17th ACM conference on Computer and communications security, (361-374)
  348. Brucker A, Krieger M, Longuet D and Wolff B A specification-based test case generation method for UML/OCL Proceedings of the 2010 international conference on Models in software engineering, (334-348)
  349. ACM
    Stampoulis A and Shao Z (2010). VeriML, ACM SIGPLAN Notices, 45:9, (333-344), Online publication date: 27-Sep-2010.
  350. ACM
    Arnold G, Hölzl J, Köksal A, Bodík R and Sagiv M (2010). Specifying and verifying sparse matrix codes, ACM SIGPLAN Notices, 45:9, (249-260), Online publication date: 27-Sep-2010.
  351. ACM
    Stampoulis A and Shao Z VeriML Proceedings of the 15th ACM SIGPLAN international conference on Functional programming, (333-344)
  352. ACM
    Arnold G, Hölzl J, Köksal A, Bodík R and Sagiv M Specifying and verifying sparse matrix codes Proceedings of the 15th ACM SIGPLAN international conference on Functional programming, (249-260)
  353. ACM
    Felty A Hybrid Proceedings of the third ACM SIGPLAN workshop on Mathematically structured functional programming, (1-2)
  354. Clarkson M and Schneider F (2010). Hyperproperties, Journal of Computer Security, 18:6, (1157-1210), Online publication date: 21-Sep-2010.
  355. Altenhofen M and Brucker A Practical issues with formal specifications Proceedings of the 15th international conference on Formal methods for industrial critical systems, (17-32)
  356. Almeida J, Bangerter E, Barbosa M, Krenn S, Sadeghi A and Schneider T A certifying compiler for zero-knowledge proofs of knowledge based on Σ-protocols Proceedings of the 15th European conference on Research in computer security, (151-167)
  357. Hurlin C and Kirchner H Semi-automatic synthesis of security policies by invariant-guided abduction Proceedings of the 7th International conference on Formal aspects of security and trust, (157-175)
  358. Walter D, Täubig H and Lüth C Experiences in applying formal verification in robotics Proceedings of the 29th international conference on Computer safety, reliability, and security, (347-360)
  359. ACM
    Kohlhase A, Kohlhase M and Lange C STEX+ Proceedings of the 6th International Conference on Semantic Systems, (1-9)
  360. Benzmüller C Combining logics in simple type theory Proceedings of the 11th international conference on Computational logic in multi-agent systems, (33-48)
  361. Nipkow T (2010). Linear Quantifier Elimination, Journal of Automated Reasoning, 45:2, (189-212), Online publication date: 1-Aug-2010.
  362. ACM
    Haftmann F, Kaliszyk C and Neuper W (2010). CTP-based programming languages?, ACM Communications in Computer Algebra, 44:1/2, (27-41), Online publication date: 29-Jul-2010.
  363. Giorgino M, Strecker M, Matthes R and Pantel M Verification of the Schorr-Waite algorithm - from trees to graphs Proceedings of the 20th international conference on Logic-based program synthesis and transformation, (67-83)
  364. Blanchette J and Krauss A Monotonicity inference for higher-order formulas Proceedings of the 5th international conference on Automated Reasoning, (91-106)
  365. Backes J and Brown C Analytic tableaux for higher-order logic with choice Proceedings of the 5th international conference on Automated Reasoning, (76-90)
  366. Cramer M, Koepke P, Kühlwein D and Schröder B Premise selection in the naproche system Proceedings of the 5th international conference on Automated Reasoning, (434-440)
  367. Aderhold M Automated synthesis of induction axioms for programs with second-order recursion Proceedings of the 5th international conference on Automated Reasoning, (263-277)
  368. Kohlhase M, Rabe F and Zholudev V Towards MKM in the large Proceedings of the 10th ASIC and 9th MKM international conference, and 17th Calculemus conference on Intelligent computer mathematics, (370-384)
  369. Kohlhase A, Kohlhase M and Lange C Dimensions of formality Proceedings of the 10th ASIC and 9th MKM international conference, and 17th Calculemus conference on Intelligent computer mathematics, (355-369)
  370. Domínguez C and Rubio J Computing in coq with infinite algebraic data structures Proceedings of the 10th ASIC and 9th MKM international conference, and 17th Calculemus conference on Intelligent computer mathematics, (204-218)
  371. Butelle F, Hivert F, Mayero M and Toumazet F Formal proof of SCHUR conjugate function Proceedings of the 10th ASIC and 9th MKM international conference, and 17th Calculemus conference on Intelligent computer mathematics, (158-171)
  372. Bortin M and Lüth C Structured formal development with quotient types in Isabelle/HOL Proceedings of the 10th ASIC and 9th MKM international conference, and 17th Calculemus conference on Intelligent computer mathematics, (34-48)
  373. Blanchette J Relational analysis of (Co)inductive predicates, (Co)algebraic datatypes, and (Co)recursive functions Proceedings of the 4th international conference on Tests and proofs, (117-134)
  374. Hales T, Harrison J, Mclaughlin S, Nipkow T, Obua S and Zumkeller R (2010). A Revision of the Proof of the Kepler Conjecture, Discrete & Computational Geometry, 44:1, (1-34), Online publication date: 1-Jul-2010.
  375. Codescu M, Horozal F, Kohlhase M, Mossakowski T, Rabe F and Sojakova K Towards logical frameworks in the heterogeneous tool set hets Proceedings of the 20th international conference on Recent Trends in Algebraic Development Techniques, (139-159)
  376. Andronick J From a proven correct microkernel to trustworthy large systems Proceedings of the 2010 international conference on Formal verification of object-oriented software, (1-9)
  377. ACM
    Klein G, Andronick J, Elphinstone K, Heiser G, Cock D, Derrin P, Elkaduwe D, Engelhardt K, Kolanski R, Norrish M, Sewell T, Tuch H and Winwood S (2010). seL4, Communications of the ACM, 53:6, (107-115), Online publication date: 1-Jun-2010.
  378. ACM
    Kammüller F, Rein A and Reiser M Feature link propagation across variability representations with Isabelle/HOL Proceedings of the 2010 ICSE Workshop on Product Line Approaches in Software Engineering, (48-53)
  379. Sutcliffe G The TPTP world - infrastructure for automated reasoning Proceedings of the 16th international conference on Logic for programming, artificial intelligence, and reasoning, (1-12)
  380. ACM
    Chen C, Dong J, Sun J and Martin A (2010). A verification system for interval-based specification languages, ACM Transactions on Software Engineering and Methodology, 19:4, (1-36), Online publication date: 1-Apr-2010.
  381. Grönniger H and Rumpe B Modeling language variability Proceedings of the 16th Monterey conference on Foundations of computer software: modeling, development, and verification of adaptive systems, (17-32)
  382. Böhme S, Moskal M, Schulte W and Wolff B (2010). HOL-Boogie--An Interactive Prover-Backend for the Verifying C Compiler, Journal of Automated Reasoning, 44:1-2, (111-144), Online publication date: 1-Feb-2010.
  383. Dietrich D and Schulz E (2010). Crystal, Journal of Automated Reasoning, 44:1-2, (79-110), Online publication date: 1-Feb-2010.
  384. James P and Chalin P (2010). Faster and More Complete Extended Static Checking for the Java Modeling Language, Journal of Automated Reasoning, 44:1-2, (145-174), Online publication date: 1-Feb-2010.
  385. ACM
    Haftmann F From higher-order logic to Haskell Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation, (155-158)
  386. ACM
    Contejean É, Paskevich A, Urbain X, Courtieu P, Pons O and Forest J A3PAT, an approach for certified automated termination proofs Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation, (63-72)
  387. Shankar N Fixpoints and search in PVS Advanced Lectures on Software Engineering, (140-161)
  388. Aderhold M Second-order programs with preconditions Verification, induction termination analysis, (129-143)
  389. Benzmüller C Verifying the modal logic cube is an easy task Verification, induction termination analysis, (117-128)
  390. Johansson M, Dixon L and Bundy A Dynamic rippling, middle-out reasoning and lemma discovery Verification, induction termination analysis, (102-116)
  391. Glesner S, Bartels B, Göthel T and Kleine M The VATES-diamond as a verifier's best friend Verification, induction termination analysis, (81-101)
  392. Brockschmidt M, Otto C, Von Essen C and Giesl J Termination graphs for Java bytecode Verification, induction termination analysis, (17-37)
  393. Aderhold M Second-order programs with preconditions Verification, induction termination analysis, (129-143)
  394. Benzmüller C Verifying the modal logic cube is an easy task Verification, induction termination analysis, (117-128)
  395. Johansson M, Dixon L and Bundy A Dynamic rippling, middle-out reasoning and lemma discovery Verification, induction termination analysis, (102-116)
  396. Glesner S, Bartels B, Göthel T and Kleine M The VATES-diamond as a verifier's best friend Verification, induction termination analysis, (81-101)
  397. Brockschmidt M, Otto C, Von Essen C and Giesl J Termination graphs for Java bytecode Verification, induction termination analysis, (17-37)
  398. Sutcliffe G (2010). The CADE-22 automated theorem proving system competition - CASC-22, AI Communications, 23:1, (47-59), Online publication date: 1-Jan-2010.
  399. Reeves S and Streader D (2009). Guarded Operations, Refinement and Simulation, Electronic Notes in Theoretical Computer Science (ENTCS), 259, (177-191), Online publication date: 1-Dec-2009.
  400. Preoteasa V and Back R (2009). Data Refinement of Invariant Based Programs, Electronic Notes in Theoretical Computer Science (ENTCS), 259, (143-163), Online publication date: 1-Dec-2009.
  401. Brucker A and Mödersheim S Integrating automated and interactive protocol verification Proceedings of the 6th international conference on Formal Aspects in Security and Trust, (248-262)
  402. Henrio L, Kammüller F and Khan M A framework for reasoning on component composition Proceedings of the 8th international conference on Formal methods for components and objects, (1-20)
  403. Henrio L and Kammüller F (2009). Functional Active Objects, Electronic Notes in Theoretical Computer Science (ENTCS), 255, (83-101), Online publication date: 1-Nov-2009.
  404. ACM
    Klein G, Elphinstone K, Heiser G, Andronick J, Cock D, Derrin P, Elkaduwe D, Engelhardt K, Kolanski R, Norrish M, Sewell T, Tuch H and Winwood S seL4 Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, (207-220)
  405. Harrison W and Hook J (2009). Achieving information flow security through monadic control of effects, Journal of Computer Security, 17:5, (599-653), Online publication date: 1-Oct-2009.
  406. ACM
    Shankar N (2009). Automated deduction for verification, ACM Computing Surveys, 41:4, (1-56), Online publication date: 1-Oct-2009.
  407. Schirmer N and Wenzel M (2009). State Spaces --- The Locale Way, Electronic Notes in Theoretical Computer Science (ENTCS), 254, (161-179), Online publication date: 1-Oct-2009.
  408. Boyton A (2009). A Verified Shared Capability Model, Electronic Notes in Theoretical Computer Science (ENTCS), 254, (25-44), Online publication date: 1-Oct-2009.
  409. Cengarle M, Grönniger H and Rumpe B Variability within Modeling Language Definitions Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems, (670-684)
  410. ACM
    Kaiser M and Lämmel R An Isabelle/HOL-based model of stratego-like traversal strategies Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming, (93-104)
  411. ACM
    Felty A and Momigliano A Reasoning with hypothetical judgments and open terms in hybrid Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming, (83-92)
  412. ACM
    del Vado Vírseda R A higher-order logical framework for the algorithmic debugging and verification of declarative programs Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming, (49-60)
  413. Frese U, Hausmann D, Lüth C, Täubig H and Walter D (2009). The Importance of Being Formal, Electronic Notes in Theoretical Computer Science (ENTCS), 238:4, (57-70), Online publication date: 1-Sep-2009.
  414. Samuel D, Roggenbach M and Isobe Y (2009). The Stable Revivals Model in CSP-Prover, Electronic Notes in Theoretical Computer Science (ENTCS), 250:2, (119-134), Online publication date: 1-Sep-2009.
  415. ACM
    Klein G, Derrin P and Elphinstone K (2009). Experience report, ACM SIGPLAN Notices, 44:9, (91-96), Online publication date: 31-Aug-2009.
  416. ACM
    Klein G, Derrin P and Elphinstone K Experience report Proceedings of the 14th ACM SIGPLAN international conference on Functional programming, (91-96)
  417. ACM
    Westbrook E, Stump A and Austin E The calculus of nominal inductive constructions Proceedings of the Fourth International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice, (74-83)
  418. ACM
    Gunter E, Osborn C and Popescu A Theory support for weak higher order abstract syntax in Isabelle/HOL Proceedings of the Fourth International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice, (12-20)
  419. ACM
    Howe D Higher-order abstract syntax in classical higher-order logic Proceedings of the Fourth International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice, (1-11)
  420. Obua S and Nipkow T (2009). Flyspeck II, Annals of Mathematics and Artificial Intelligence, 56:3-4, (245-272), Online publication date: 1-Aug-2009.
  421. Böhm P Incremental modelling and verification of the PCI express transaction layer Proceedings of the 7th IEEE/ACM international conference on Formal Methods and Models for Codesign, (36-45)
  422. ACM
    Wasserrab D, Lohner D and Snelting G On PDG-based noninterference and its modular proof Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, (31-44)
  423. ACM
    Zee K, Kuncak V and Rinard M An integrated proof language for imperative programs Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, (338-351)
  424. Grönniger H, Ringert J and Rumpe B System Model-Based Definition of Modeling Language Semantics Proceedings of the Joint 11th IFIP WG 6.1 International Conference FMOODS '09 and 29th IFIP WG 6.1 International Conference FORTE '09 on Formal Techniques for Distributed Systems, (152-166)
  425. Bertot Y and Komendantskaya E Using Structural Recursion for Corecursion Types for Proofs and Programs, (220-236)
  426. Haftmann F and Wenzel M Local Theory Specifications in Isabelle/Isar Types for Proofs and Programs, (153-168)
  427. Blanchette J (2009). Proof Pearl, Journal of Automated Reasoning, 43:1, (1-18), Online publication date: 1-Jun-2009.
  428. ACM
    Zee K, Kuncak V and Rinard M (2009). An integrated proof language for imperative programs, ACM SIGPLAN Notices, 44:6, (338-351), Online publication date: 28-May-2009.
  429. ACM
    Erkök L and Matthews J High assurance programming in Cryptol Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, (1-2)
  430. ACM
    Malloy B, Sitaraman M and Hallstrom J Detecting overflow vulnerabilities using automated verification Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, (1-4)
  431. Alkassar E, Hillebrand M, Leinenbach D, Schirmer N, Starostin A and Tsyban A (2009). Balancing the Load, Journal of Automated Reasoning, 42:2-4, (389-454), Online publication date: 1-Apr-2009.
  432. Daum M, Dörrenbächer J and Wolff B (2009). Proving Fairness and Implementation Correctness of a Microkernel Scheduler, Journal of Automated Reasoning, 42:2-4, (349-388), Online publication date: 1-Apr-2009.
  433. Schröder L and Mossakowski T (2009). HasCasl, Theoretical Computer Science, 410:12-13, (1217-1260), Online publication date: 20-Mar-2009.
  434. Wang L, Chang Y and Cheng K (2009). Electronic Design Automation, 10.5555/2843514, Online publication date: 11-Mar-2009.
  435. ACM
    Leino K and Monahan R Reasoning about comprehensions with first-order SMT solvers Proceedings of the 2009 ACM symposium on Applied Computing, (615-622)
  436. ACM
    James P and Chalin P Extended static checking in JML4 Proceedings of the 2009 ACM symposium on Applied Computing, (609-614)
  437. ACM
    Dagand P, Kostić D and Kuncak V Opis Proceedings of the 4th international workshop on Types in language design and implementation, (65-78)
  438. ACM
    Erkök L and Matthews J Pragmatic equivalence and safety checking in Cryptol Proceedings of the 3rd workshop on Programming languages meets program verification, (73-82)
  439. Gacek A, Miller D and Nadathur G (2009). Reasoning in Abella about Structural Operational Semantics Specifications, Electronic Notes in Theoretical Computer Science (ENTCS), 228, (85-100), Online publication date: 1-Jan-2009.
  440. Aransay J (2008). Mechanized reasoning in Homological Algebra, AI Communications, 21:4, (265-267), Online publication date: 1-Dec-2008.
  441. Brucker A, Brügger L and Wolff B (2008). Verifying Test-Hypotheses, Electronic Notes in Theoretical Computer Science (ENTCS), 220:1, (15-27), Online publication date: 1-Dec-2008.
  442. Owens S and Slind K (2008). Adapting functional programs to higher order logic, Higher-Order and Symbolic Computation, 21:4, (377-409), Online publication date: 1-Dec-2008.
  443. Böhm P and Melham T A refinement approach to design and verification of on-chip communication protocols Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, (1-8)
  444. Brucker A and Wolff B (2008). An Extensible Encoding of Object-oriented Data Models in hol, Journal of Automated Reasoning, 41:3-4, (219-249), Online publication date: 1-Nov-2008.
  445. ACM
    Krauss A (2008). Pattern minimization problems over recursive data types, ACM SIGPLAN Notices, 43:9, (267-274), Online publication date: 27-Sep-2008.
  446. ACM
    Aldrich J, Simmons R and Shin K SASyLF Proceedings of the 2008 international workshop on Functional and declarative programming in education, (31-40)
  447. ACM
    Krauss A Pattern minimization problems over recursive data types Proceedings of the 13th ACM SIGPLAN international conference on Functional programming, (267-274)
  448. Chapurlat V and Braesch C (2008). Verification, validation, qualification and certification of enterprise models, Computers in Industry, 59:7, (711-721), Online publication date: 1-Sep-2008.
  449. Chapman P, Mckinna J and Urban C Mechanising a Proof of Craig's Interpolation Theorem for Intuitionistic Logic in Nominal Isabelle Proceedings of the 9th AISC international conference, the 15th Calculemas symposium, and the 7th international MKM conference on Intelligent Computer Mathematics, (38-52)
  450. Verchinine K, Lyaletski A, Paskevich A and Anisimov A On Correctness of Mathematical Texts from a Logical and Practical Point of View Proceedings of the 9th AISC international conference, the 15th Calculemas symposium, and the 7th international MKM conference on Intelligent Computer Mathematics, (583-598)
  451. ACM
    Montenegro M, Peña R and Segura C A type system for safe memory management and its proof of correctness Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming, (152-162)
  452. Nguyen H and Chin W Enhancing Program Verification with Lemmas Proceedings of the 20th international conference on Computer Aided Verification, (355-369)
  453. Kolanski R (2008). A Logic for Virtual Memory, Electronic Notes in Theoretical Computer Science (ENTCS), 217, (61-77), Online publication date: 1-Jul-2008.
  454. Leinenbach D and Petrova E (2008). Pervasive Compiler Verification -- From Verified Programs to Verified Systems, Electronic Notes in Theoretical Computer Science (ENTCS), 217, (23-40), Online publication date: 1-Jul-2008.
  455. Chaieb A and Nipkow T (2008). Proof Synthesis and Reflection for Linear Arithmetic, Journal of Automated Reasoning, 41:1, (33-59), Online publication date: 1-Jul-2008.
  456. ACM
    Zee K, Kuncak V and Rinard M Full functional verification of linked data structures Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation, (349-361)
  457. Correctness of a Fault-Tolerant Real-Time Scheduler and its Hardware Implementation Proceedings of the Sixth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (175-186)
  458. ACM
    Zee K, Kuncak V and Rinard M (2008). Full functional verification of linked data structures, ACM SIGPLAN Notices, 43:6, (349-361), Online publication date: 30-May-2008.
  459. ACM
    CHEN C, DONG J and SUN J A verification system for timed interval calculus Proceedings of the 30th international conference on Software engineering, (271-280)
  460. ACM
    Schaefer I and Poetzsch-Heffter A Slicing for model reduction in adaptive embedded systems development Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems, (25-32)
  461. ACM
    Elkaduwe D, Derrin P and Elphinstone K Kernel design for isolation and assurance of physical memory Proceedings of the 1st workshop on Isolation and integration in embedded systems, (35-40)
  462. Strecker M (2008). Modeling and Verifying Graph Transformations in Proof Assistants, Electronic Notes in Theoretical Computer Science (ENTCS), 203:1, (135-148), Online publication date: 1-Mar-2008.
  463. ACM
    Tobin-Hochstadt S and Felleisen M (2008). The design and implementation of typed scheme, ACM SIGPLAN Notices, 43:1, (395-406), Online publication date: 14-Jan-2008.
  464. ACM
    Voigtländer J (2008). Much ado about two (pearl), ACM SIGPLAN Notices, 43:1, (29-35), Online publication date: 14-Jan-2008.
  465. ACM
    Tobin-Hochstadt S and Felleisen M The design and implementation of typed scheme Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (395-406)
  466. ACM
    Voigtländer J Much ado about two (pearl) Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (29-35)
  467. ACM
    Sultana N and Thompson S Mechanical verification of refactorings Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation, (51-60)
  468. Barthe G and Prensa Nieto L (2007). Secure information flow for a concurrent language with scheduling, Journal of Computer Security, 15:6, (647-689), Online publication date: 1-Dec-2007.
  469. ACM
    Avigad J, Donnelly K, Gray D and Raff P (2007). A formally verified proof of the prime number theorem, ACM Transactions on Computational Logic, 9:1, (2-es), Online publication date: 1-Dec-2007.
  470. Chen C, Dong J and Sun J Machine-assisted proof support for validation beyond Simulink Proceedings of the formal engineering methods 9th international conference on Formal methods and software engineering, (96-115)
  471. ACM
    Jackson P, Ellis B and Sharp K Using SMT solvers to verify high-integrity programs Proceedings of the second workshop on Automated formal methods, (60-68)
  472. ACM
    Ireland A Cooperative reasoning for automatic software verification Proceedings of the second workshop on Automated formal methods, (51-54)
  473. Blech J and Poetzsch-Heffter A (2007). A Certifying Code Generation Phase, Electronic Notes in Theoretical Computer Science (ENTCS), 190:4, (65-82), Online publication date: 1-Nov-2007.
  474. ACM
    Bakhshi R, Bonnet F, Fokkink W and Haverkort B (2007). Formal analysis techniques for gossiping protocols, ACM SIGOPS Operating Systems Review, 41:5, (28-36), Online publication date: 1-Oct-2007.
  475. Bengtson J and Parrow J (2007). A Completeness Proof for Bisimulation in the pi-calculus Using Isabelle, Electronic Notes in Theoretical Computer Science (ENTCS), 192:1, (61-75), Online publication date: 1-Oct-2007.
  476. Burel G Unbounded proof-length speed-up in deduction modulo Proceedings of the 21st international conference, and Proceedings of the 16th annuall conference on Computer Science Logic, (496-511)
  477. Obua S Proof pearl Proceedings of the 20th international conference on Theorem proving in higher order logics, (223-231)
  478. Contejean E, Courtieu P, Forest J, Pons O and Urbain X Certification of Automated Termination Proofs Proceedings of the 6th international symposium on Frontiers of Combining Systems, (148-162)
  479. ACM
    Darvas Á and Müller P Faithful mapping of model classes to mathematical structures Proceedings of the 2007 conference on Specification and verification of component-based systems: 6th Joint Meeting of the European Conference on Software Engineering and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, (31-38)
  480. Schröder L Bootstrapping types and cotypes in HASCASL Proceedings of the 2nd international conference on Algebra and coalgebra in computer science, (447-461)
  481. Billingsley W and Robinson P (2007). Student Proof Exercises Using MathsTiles and Isabelle/HOL in an Intelligent Book, Journal of Automated Reasoning, 39:2, (181-218), Online publication date: 1-Aug-2007.
  482. Couchot J and Lescuyer S Handling Polymorphism in Automated Deduction Proceedings of the 21st international conference on Automated Deduction: Automated Deduction, (263-278)
  483. ACM
    Heiser G, Elphinstone K, Kuz I, Klein G and Petters S (2007). Towards trustworthy computing systems, ACM SIGOPS Operating Systems Review, 41:4, (3-11), Online publication date: 1-Jul-2007.
  484. Broy M, Fox J, Hölzl F, Koss D, Kuhrmann M, Meisinger M, Penzenstadler B, Rittmann S, Schätz B, Spichkova M and Wild D Service-Oriented Modeling of CoCoME with Focus and AutoFocus The Common Component Modeling Example, (177-206)
  485. Elphinstone K, Klein G, Derrin P, Roscoe T and Heiser G Towards a practical, verified kernel Proceedings of the 11th USENIX workshop on Hot topics in operating systems, (1-6)
  486. Dennis L (2007). Enhancing Theorem Prover Interfaces with Program Slice Information, Electronic Notes in Theoretical Computer Science (ENTCS), 174:2, (19-33), Online publication date: 1-May-2007.
  487. Krstic S, Goel A, Grundy J and Tinelli C Combined satisfiability modulo parametric theories Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (602-617)
  488. Mossakowski T, Maeder C and Lüttich K The heterogeneous tool set, HETS Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (519-522)
  489. Li G, Owens S and Slind K Structure of a proof-producing compiler for a subset of higher order logic Proceedings of the 16th European Symposium on Programming, (205-219)
  490. Bengtson J and Parrow J Formalising the π-calculus using nominal logic Proceedings of the 10th international conference on Foundations of software science and computational structures, (63-77)
  491. Zee K, Kuncak V, Taylor M and Rinard M Runtime checking for program verification Proceedings of the 7th international conference on Runtime verification, (202-213)
  492. ACM
    Li Y Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocols Proceedings of the 2007 ACM symposium on Applied computing, (1534-1535)
  493. Geuvers H, Niqui M, Spitters B and Wiedijk F (2007). Constructive analysis, types and exact real numbers, Mathematical Structures in Computer Science, 17:1, (3-36), Online publication date: 1-Feb-2007.
  494. ACM
    Tuch H, Klein G and Norrish M Types, bytes, and separation logic Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (97-108)
  495. ACM
    Pitts A and Shinwell M Generative unbinding of names Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (85-95)
  496. ACM
    Tuch H, Klein G and Norrish M (2007). Types, bytes, and separation logic, ACM SIGPLAN Notices, 42:1, (97-108), Online publication date: 17-Jan-2007.
  497. ACM
    Pitts A and Shinwell M (2007). Generative unbinding of names, ACM SIGPLAN Notices, 42:1, (85-95), Online publication date: 17-Jan-2007.
  498. Bouillaguet C, Kuncak V, Wies T, Zee K and Rinard M Using first-order theorem provers in the Jahob data structure verification system Proceedings of the 8th international conference on Verification, model checking, and abstract interpretation, (74-88)
  499. Kuncak V, Lam P, Zee K and Rinard M (2006). Modular Pluggable Analyses for Data Structure Consistency, IEEE Transactions on Software Engineering, 32:12, (988-1005), Online publication date: 1-Dec-2006.
  500. Déharbe D, Fontaine P, Ranise S and Ringeissen C Decision procedures for the formal analysis of software Proceedings of the Third international conference on Theoretical Aspects of Computing, (366-370)
  501. Chaieb A Proof-producing program analysis Proceedings of the Third international conference on Theoretical Aspects of Computing, (287-301)
  502. Obua S Partizan games in Isabelle/HOLZF Proceedings of the Third international conference on Theoretical Aspects of Computing, (272-286)
  503. Nipkow T Verifying a hotel key card system Proceedings of the Third international conference on Theoretical Aspects of Computing, (1-14)
  504. Chen C and Dong J Applying timed interval calculus to simulink diagrams Proceedings of the 8th international conference on Formal Methods and Software Engineering, (74-93)
  505. Dharmadeep M and Gopinath K Proactive leader election in asynchronous shared memory systems Proceedings of the 4th international conference on Automated Technology for Verification and Analysis, (384-398)
  506. Brucker A, Doser J and Wolff B A model transformation semantics and analysis methodology for SecureUML Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems, (306-320)
  507. ACM
    Derrin P, Elphinstone K, Klein G, Cock D and Chakravarty M Running the manual Proceedings of the 2006 ACM SIGPLAN workshop on Haskell, (60-71)
  508. Brady E Ivor, a proof engine Proceedings of the 18th international conference on Implementation and application of functional languages, (145-162)
  509. Krauss A Partial recursive functions in higher-order logic Proceedings of the Third international joint conference on Automated Reasoning, (589-603)
  510. Chaieb A Verifying mixed real-integer quantifier elimination Proceedings of the Third international joint conference on Automated Reasoning, (528-540)
  511. Nipkow T, Bauer G and Schultz P Flyspeck i Proceedings of the Third international joint conference on Automated Reasoning, (21-35)
  512. Mahboubi A Proving formally the implementation of an efficient gcd algorithm for polynomials Proceedings of the Third international joint conference on Automated Reasoning, (438-452)
  513. Miller D Representing and reasoning with operational semantics Proceedings of the Third international joint conference on Automated Reasoning, (4-20)
  514. Obua S and Skalberg S Importing HOL into Isabelle/HOL Proceedings of the Third international joint conference on Automated Reasoning, (298-302)
  515. ACM
    Pike L, Shields M and Matthews J A verifying core for a cryptographic language compiler Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications, (1-10)
  516. Obua S Checking conservativity of overloaded definitions in higher-order logic Proceedings of the 17th international conference on Term Rewriting and Applications, (212-226)
  517. Winwood S, Klein G and Chakravarty M On the automated synthesis of proof-carrying temporal reference monitors Proceedings of the 16th international conference on Logic-based program synthesis and transformation, (111-126)
  518. Siek J and Taha W A semantic analysis of c++ templates Proceedings of the 20th European conference on Object-Oriented Programming, (304-327)
  519. Lüttich K and Mossakowski T Reasoning support for CASL with automated theorem proving systems Proceedings of the 18th international conference on Recent trends in algebraic development techniques, (74-91)
  520. Yang H, Zhang X and Wang Y A correctness proof of the SRP protocal Proceedings of the 20th international conference on Parallel and distributed processing, (357-357)
  521. Kuncak V and Rinard M An overview of the Jahob analysis system Proceedings of the 20th international conference on Parallel and distributed processing, (285-285)
  522. Capretta V and Felty A Combining de Bruijn indices and higher-order abstract syntax in Coq Proceedings of the 2006 international conference on Types for proofs and programs, (63-77)
  523. Klein G and Huuck R High assurance system software Proceedings of the 10th Australian workshop on Safety critical systems and software - Volume 55, (59-67)
  524. Fontaine P, Marion J, Merz S, Nieto L and Tiu A Expressiveness + automation + soundness Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (167-181)
  525. Kolanski R and Klein G Formalising the L4 microkernel API Proceedings of the Twelfth Computing: The Australasian Theory Symposium - Volume 51, (53-68)
  526. Johansson M, Bundy A and Dixon L Best-First rippling Reasoning, Action and Interaction in AI Theories and Systems, (83-100)
  527. Kolanski R and Klein G Formalising the L4 microkernel API Proceedings of the 12th Computing: The Australasian Theroy Symposium - Volume 51, (53-68)
  528. Seino T, Ogata K and Futatsugi K (2006). A Toolkit for Generating and Displaying Proof Scores in the OTS/CafeOBJ Method, Electronic Notes in Theoretical Computer Science (ENTCS), 147:1, (57-72), Online publication date: 1-Jan-2006.
  529. Bodeveix J, Chemouil D, Filali M and Strecker M (2005). Towards formalising AADL in Proof Assistants, Electronic Notes in Theoretical Computer Science (ENTCS), 141:3, (153-169), Online publication date: 1-Dec-2005.
  530. Blech J, Glesner S, Leitner J and Mülling S (2005). Optimizing Code Generation from SSA Form, Electronic Notes in Theoretical Computer Science (ENTCS), 141:2, (33-51), Online publication date: 1-Dec-2005.
  531. Gilmore S and Prowse M (2005). Proof-carrying Bytecode, Electronic Notes in Theoretical Computer Science (ENTCS), 141:1, (3-18), Online publication date: 1-Dec-2005.
  532. ACM
    Grov G Verifying the correctness of hume programs Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, (444-447)
  533. Wölfl S and Mossakowski T CASL specifications of qualitative calculi Proceedings of the 2005 international conference on Spatial Information Theory, (200-217)
  534. Brotherston J Cyclic proofs for first-order logic with inductive definitions Proceedings of the 14th international conference on Automated Reasoning with Analytic Tableaux and Related Methods, (78-92)
  535. Leinenbach D, Paul W and Petrova E Towards the Formal Verification of a C0 Compiler Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (2-12)
  536. Blech J, Gesellensetter L and Glesner S Formal Verification of Dead Code Elimination in Isabelle/HOL Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (200-209)
  537. ACM
    In der Rieden T and Knapp S An approach to the pervasive formal specification and verification of an automotive system Proceedings of the 10th international workshop on Formal methods for industrial critical systems, (115-124)
  538. Norrish M and Slind K Proof pearl Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics, (397-408)
  539. Nipkow T and Paulson L Proof pearl Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics, (385-396)
  540. Ortner V and Schirmer N Verification of BDD normalization Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics, (261-277)
  541. Obua S Proving bounds for real linear programs in Isabelle/HOL Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics, (227-244)
  542. Huffman B, Matthews J and White P Axiomatic constructor classes in Isabelle/HOLCF Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics, (147-162)
  543. Gargano M, Hillebrand M, Leinenbach D and Paul W On the correctness of operating system kernels Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics, (1-16)
  544. Urban C and Tasson C Nominal techniques in Isabelle/HOL Proceedings of the 20th international conference on Automated Deduction, (38-53)
  545. Ogawa M, Horita E and Ono S Proving properties of incremental merkle trees Proceedings of the 20th international conference on Automated Deduction, (424-440)
  546. Kuncak V, Nguyen H and Rinard M An algorithm for deciding BAPA Proceedings of the 20th international conference on Automated Deduction, (260-277)
  547. Basin D, Kuruma H, Takaragi K and Wolff B Verification of a signature architecture with HOL-Z Proceedings of the 2005 international conference on Formal Methods, (269-285)
  548. Jojgov G Translating a fragment of weak type theory into type theory with open terms Proceedings of the 4th international conference on Mathematical Knowledge Management, (389-403)
  549. Brucker A and Wolff B Interactive testing with HOL-TestGen Proceedings of the 5th international conference on Formal Approaches to Software Testing, (87-102)
  550. ACM
    Botaschanjan J, Kof L, Kühnel C and Spichkova M (2005). Towards verified automotive software, ACM SIGSOFT Software Engineering Notes, 30:4, (1-6), Online publication date: 1-Jul-2005.
  551. ACM
    Siek J and Lumsdaine A Essential language support for generic programming Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, (73-84)
  552. ACM
    Siek J and Lumsdaine A (2005). Essential language support for generic programming, ACM SIGPLAN Notices, 40:6, (73-84), Online publication date: 12-Jun-2005.
  553. ACM
    Botaschanjan J, Kof L, Kühnel C and Spichkova M Towards verified automotive software Proceedings of the second international workshop on Software engineering for automotive systems, (1-6)
  554. Wildmoser M and Nipkow T Asserting bytecode safety Proceedings of the 14th European conference on Programming Languages and Systems, (326-341)
  555. Hausmann D, Mossakowski T and Schröder L Iterative circular coinduction for CoCasl in isabelle/HOL Proceedings of the 8th international conference, held as part of the joint European Conference on Theory and Practice of Software conference on Fundamental Approaches to Software Engineering, (341-356)
  556. ACM
    Sohr K, Drouineaud M and Ahn G Formal specification of role-based security policies for clinical information systems Proceedings of the 2005 ACM symposium on Applied computing, (332-339)
  557. Aransay J, Ballarin C and Rubio J Extracting computer algebra programs from statements Proceedings of the 10th international conference on Computer Aided Systems Theory, (159-168)
  558. Jouannaud J Higher-Order rewriting Processes, Terms and Cycles, (224-250)
  559. Compton M Stenning's protocol implemented in UDP and verified in Isabelle Proceedings of the 2005 Australasian symposium on Theory of computing - Volume 41, (21-30)
  560. Hemer D A formal approach to component adaptation and composition Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38, (259-266)
  561. Berghofer S Extracting a normalization algorithm in Isabelle/HOL Proceedings of the 2004 international conference on Types for Proofs and Programs, (50-65)
  562. Meyer T and Wolff B Tactic-based optimized compilation of functional programs Proceedings of the 2004 international conference on Types for Proofs and Programs, (201-214)
  563. Schoeller B, Widmer T and Meyer B Making specifications complete through models Proceedings of the 2004 international conference on Architecting Systems with Trustworthy Components, (48-70)
  564. Sato M A simple theory of expressions, judgments and derivations Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, (437-451)
  565. ACM
    Barthe G and Nieto L Formally verifying information flow type systems for concurrent and thread systems Proceedings of the 2004 ACM workshop on Formal methods in security engineering, (13-22)
  566. Krieg-Brückner B, Frese U, Lüttich K, Mandel C, Mossakowski T and Ross R Specification of an ontology for route graphs Proceedings of the 4th international conference on Spatial Cognition: reasoning, Action, Interaction, (390-412)
  567. Brucker A and Wolff B Symbolic test case generation for primitive recursive functions Proceedings of the 4th international conference on Formal Approaches to Software Testing, (16-32)
  568. Drouineaud M, Bortin M, Torrini P and Sohr K A First Step Towards Formal Verification of Security Policy Properties for RBAC Proceedings of the Quality Software, Fourth International Conference, (60-67)
  569. Liang C, Nadathur G and Qi X (2004). Choices in Representation and Reduction Strategies for Lambda Terms in Intensional Contexts, Journal of Automated Reasoning, 33:2, (89-132), Online publication date: 1-Sep-2004.
  570. ACM
    Cleva J, Leach J and López-Fraguas F A logic programming approach to the verification of functional-logic programs Proceedings of the 6th ACM SIGPLAN international conference on Principles and practice of declarative programming, (9-19)
  571. Kamareddine F and Nederpelt R (2004). A Refinement of de Bruijn's Formal Language of Mathematics, Journal of Logic, Language and Information, 13:3, (287-340), Online publication date: 1-Jun-2004.
  572. Leow W, Khoo S and Sun Y Automated Generation of Test Programs from Closed Specifications of Classes and Test Cases Proceedings of the 26th International Conference on Software Engineering, (96-105)
  573. Lüth C, Roggenbach M and Schröder L CCC Proceedings of the 17th international conference on Recent Trends in Algebraic Development Techniques, (94-105)
  574. Schröder L, Mossakowski T and Lüth C Type class polymorphism in an institutional framework Proceedings of the 17th international conference on Recent Trends in Algebraic Development Techniques, (234-251)
  575. Poetzsch-Heffter A and Rauch N Application and formal specification of sorted term-position algebras Proceedings of the 17th international conference on Recent Trends in Algebraic Development Techniques, (201-217)
  576. Aspinall D, Gilmore S, Hofmann M, Sannella D and Stark I Mobile resource guarantees for smart devices Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, (1-26)
  577. Nieto L The rely-guarantee method in Isabelle/HOL Proceedings of the 12th European conference on Programming, (348-362)
  578. Wiedijk F (2003). A New Implementation of Automath, Journal of Automated Reasoning, 29:3-4, (365-387), Online publication date: 14-Jan-2003.
  579. Wenzel M and Wiedijk F (2003). A Comparison of Mizar and Isar, Journal of Automated Reasoning, 29:3-4, (389-411), Online publication date: 14-Jan-2003.
  580. ACM
    Bella G, Paulson L and Massacci F The verification of an industrial payment protocol Proceedings of the 9th ACM conference on Computer and communications security, (12-20)
  581. Nipkow T Structured proofs in isar/HOL Proceedings of the 2002 international conference on Types for proofs and programs, (259-278)
  582. Brucker A and Wolff B Using theory morphisms for implementing formal methods tools Proceedings of the 2002 international conference on Types for proofs and programs, (59-77)
Contributors
  • Ludwig-Maximilians-University Munich
  • UNSW Sydney
  • University of Cambridge

Recommendations