Search Constraints
Search Results
Select an image to start the slideshow
Formalization and Verification of Rewriting-Based Security Polices
1 of 10
Noninterference in Concurrent Game Structures
2 of 10
Graph Decompositions and Monadic Second Order Logic
3 of 10
Multi-Decision Policy and Policy Combinator Specifications
4 of 10
First-Order Models for Configuration Analysis
5 of 10
A Framework for Exploring Finite Models
6 of 10
User Evaluation Framework for Model Finding Research
7 of 10
Alloy-Guided Verification of Cooperative Autonomous Driving Behavior
8 of 10
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
9 of 10
A Coq Formalization of Unification Modulo Exclusive-Or
10 of 10