Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Formal methods: Practice and experience
Formal methods use mathematical models for analysis and verification at any part of the
program life-cycle. We describe the state of the art in the industrial use of formal methods …
program life-cycle. We describe the state of the art in the industrial use of formal methods …
New opportunities for integrated formal methods
Formal methods have provided approaches for investigating software engineering
fundamentals and also have high potential to improve current practices in dependability …
fundamentals and also have high potential to improve current practices in dependability …
[KNIHA][B] Software Abstractions: logic, language, and analysis
D Jackson - 2012 - books.google.com
An approach to software design that introduces a fully automated analysis giving designers
immediate feedback, now featuring the latest version of the Alloy language. In Software …
immediate feedback, now featuring the latest version of the Alloy language. In Software …
Teechain: a secure payment network with asynchronous blockchain access
Blockchains such as Bitcoin and Ethereum execute payment transactions securely, but their
performance is limited by the need for global consensus. Payment networks overcome this …
performance is limited by the need for global consensus. Payment networks overcome this …
[KNIHA][B] Secure systems development with UML
J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …
High-quality development of security-critical systems is difficult, mainly because of the …
Manifold discriminant analysis
This paper presents a novel discriminative learning method, called manifold discriminant
analysis (MDA), to solve the problem of image set classification. By modeling each image …
analysis (MDA), to solve the problem of image set classification. By modeling each image …
The verifying compiler: A grand challenge for computing research
T Hoare - Journal of the ACM (JACM), 2003 - dl.acm.org
This contribution proposes a set of criteria that distinguish a grand challenge in science or
engineering from the many other kinds of short-term or long-term research problems that …
engineering from the many other kinds of short-term or long-term research problems that …
A survey of practical formal methods for security
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …
introduces new risks for cyber attacks, which can compromise the security and disrupt the …
The Semantics of Circus
The Semantics of Circus Page 1 The Semantics of Circus Jim Woodcock1 and Ana Cavalcanti2
1 Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford, UK …
1 Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford, UK …
Full functional verification of linked data structures
We present the first verification of full functional correctness for a range of linked data
structure implementations, including mutable lists, trees, graphs, and hash tables …
structure implementations, including mutable lists, trees, graphs, and hash tables …