Search results for: Scott D. Stoller
Lecture Notes in Computer Science > Hardware and Software, Verification and Testing > PADTAD > 191-207
Lecture Notes in Computer Science > Tools and Algorithms for the Construction and Analysis of Systems > Tools I > 46-49
IFIP — The International Federation for Information Processing > Emerging Challenges for Security, Privacy and Trust > Validation, Verification, Evaluation > 202-213
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 5 > 533 - 545
IEEE Transactions on Dependable and Secure Computing > 2014 > 11 > 5 > 412 - 424
Formal Methods in System Design > 2012 > 41 > 3 > 295-320
International Journal on Software Tools for Technology Transfer > 2012 > 14 > 3 > 327-347
Theoretical Computer Science > 2011 > 412 > 44 > 6208-6234
Computers & Security > 2011 > 30 > 2-3 > 148-164
Formal Methods in System Design > 2006 > 28 > 3 > 263-289
Formal Methods in System Design > 2005 > 26 > 2 > 183-196
Electronic Notes in Theoretical Computer Science > 2003 > 89 > 2 > 1-19
Science of Computer Programming > 2003 > 47 > 2-3 > 221-242
Higher-Order and Symbolic Computation > 2003 > 16 > 1-2 > 37-62