Author of the publication

Two Automated Methods in Implementation Proofs.

, and . CADE, volume 310 of Lecture Notes in Computer Science, page 622-642. Springer, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using the State Delta Verification System (SDVS) for Hardware Verification., , , and . TPCD, volume A-10 of IFIP Transactions, page 337-360. North-Holland, (1992)Two Automated Methods in Implementation Proofs., and . CADE, volume 310 of Lecture Notes in Computer Science, page 622-642. Springer, (1988)Safety via State Transition Language Plus Invariants., and . CSFW, page 71-77. IEEE Computer Society, (1989)על מודלים מינימליים (On minimal models.).. Hebrew University of Jerusalem, Israel, (1974)The Incorporation of Testing into Verification: Direct, Modular, and Hierarchical Correctness Degrees (Abstract).. ISSTA, page 197. ACM, (1994)Syntactic and Semantic Dependence of Array-Arithmetic Sentences, with an Application to Program Verification.. Fundam. Informaticae, 27 (1): 77-100 (1996)Verification of the FTSC microprogram., , and . MICRO, page 118. ACM, (1978)Preface.. LAFT@LICS, volume 258 of Electronic Notes in Theoretical Computer Science, page 1-2. Elsevier, (2009)A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies., and . CSFW, page 127-138. MITRE Corporation Press, (1988)Expressibility of Output Equals Input., and . Acta Inf., 29 (6/7): 645-662 (1992)