Search Constraints
Search Results
Select an image to start the slideshow
Verification techniques of feature-oriented Java
1 of 14
Timing diagram to Buchi automation translation
2 of 14
Random finite-state automata for model checking
3 of 14
Mining state machine simulations
4 of 14
Generating header files for hardware simulators
5 of 14
FSATS -- a case study of computer-aided verification for large systems
6 of 14
Extensible timing diagram editor
7 of 14
Emergency response simulation
8 of 14
Development of cross-disciplinary course material
9 of 14
Comparing algorithms for symbolic cycle detection
10 of 14
Automatic verification of role based access control policies
11 of 14
Analyzing Trust by Scripting CPSA
12 of 14
CounterMeasures: An Interactive Game for Security Training
13 of 14
Peer Review in Cybersecurity Education
14 of 14