Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2771)
Editorial
(424)
by Journal
by Funding Agency
Clear filters
Powered by
79 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.2.4 - Software/Program Verification
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Specification and Refinement of Access Control
Dominique Méry
,
Stephan Merz
10.3217/jucs-013-08-1073
28-08-2007
Unique: 847 | Total: 1024
Access Period: 0
0
1073-1093
HTML
XML
PDF
Research Article
CML: C Modeling Language
Frederico Jr.
,
Ricardo Lima
,
Marcio Cornelio
,
Sergio Soares
,
Paulo Maciel
,
Raimundo Barreto
,
Eduardo Tavares
10.3217/jucs-013-06-0682
28-06-2007
Unique: 920 | Total: 1177
Access Period: 0
0
682-700
HTML
XML
PDF
Research Article
Realising the Benefits of Formal Methods
Anthony Hall
10.3217/jucs-013-05-0669
28-05-2007
Unique: 756 | Total: 910
Access Period: 0
0
669-678
HTML
XML
PDF
Research Article
The Verification Grand Challenge
Jim Woodcock
,
Richard Banach
10.3217/jucs-013-05-0661
28-05-2007
Unique: 909 | Total: 1185
Access Period: 0
0
661-668
HTML
XML
PDF
Research Article
Automated Formal Methods Enter the Mainstream
John Rushby
10.3217/jucs-013-05-0650
28-05-2007
Unique: 859 | Total: 1090
Access Period: 0
0
650-660
HTML
XML
PDF
Research Article
Model Checking: Software and Beyond
Edmund Clarke
,
Flavio Lerda
10.3217/jucs-013-05-0639
28-05-2007
Unique: 978 | Total: 1163
Access Period: 0
0
639-649
HTML
XML
PDF
Research Article
Formal Methods: Theory Becoming Practice
Jean-Raymond Abrial
10.3217/jucs-013-05-0619
28-05-2007
Unique: 858 | Total: 1075
Access Period: 0
0
619-628
HTML
XML
PDF
Research Article
Formal Methods for Specifying, Validating, and Verifying Requirements
Constance Heitmeyer
10.3217/jucs-013-05-0607
28-05-2007
Unique: 1089 | Total: 1362
Access Period: 0
0
607-618
HTML
XML
PDF
Research Article
Software Is More Than Code
Sriram Rajamani
10.3217/jucs-013-05-0602
28-05-2007
Unique: 800 | Total: 989
Access Period: 0
0
602-606
HTML
XML
PDF
Research Article
Formal MethodsGuest Editorial
Richard Banach
10.3217/jucs-013-05-0593
28-05-2007
Unique: 781 | Total: 954
Access Period: 0
0
593-601
HTML
XML
PDF
Research Article
Verifying Real-Time Properties of tccp Programs
María Alpuente
,
María del Mar Gallardo
,
Ernesto Pimentel
,
Alicia Villanueva
10.3217/jucs-012-11-1551
28-11-2006
Unique: 999 | Total: 1247
Access Period: 0
0
1551-1573
HTML
XML
PDF
Research Article
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM
Wan Fokkink
,
Jun Pang
10.3217/jucs-012-08-0981
28-08-2006
Unique: 882 | Total: 1114
Access Period: 0
0
981-1006
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK