Author of the publication

CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms.

, , and . KBSE, page 151-160. IEEE Computer Society, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Security-Enhanced Linux Policy Specifications., , and . POLICY, page 158-. IEEE Computer Society, (2003)Applying Formal Methods to an Information Security Device: An Experience Report., , and . HASE, page 81-88. IEEE Computer Society, (1999)Partial Implementations of Abstract Data Types: Theory and Practice. University of Illinois Urbana-Champaign, USA, (1988)Can We Build an Automatic Program Verifier? Invariant Proofs and Other Challenges.. VSTTE, volume 4171 of Lecture Notes in Computer Science, page 308-317. Springer, (2005)Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit., , , and . TPHOLs, volume A-20 of IFIP Transactions, page 427-447. North-Holland/Elsevier, (1992)SCR: A Practical Approach to Building a High Assurance COMSEC System., , and . ACSAC, page 109-118. IEEE Computer Society, (1999)Extended abstract: organizing automaton specifications to achieve faithful representation., and . MEMOCODE, page 245-246. IEEE Computer Society, (2005)Tools for constructing requirements specifications: the SCR Toolset at the age of nine, , , and . Comput. Syst. Sci. Eng., (2005)CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms., , and . KBSE, page 151-160. IEEE Computer Society, (1991)Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL., , , , , , and . HUG, volume 780 of Lecture Notes in Computer Science, page 29-42. Springer, (1993)