咨询与建议

限定检索结果

文献类型

  • 179 篇 会议
  • 36 册 图书
  • 13 篇 期刊文献

馆藏范围

  • 226 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 166 篇 工学
    • 155 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 16 篇 电气工程
    • 16 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 5 篇 土木工程
    • 3 篇 建筑学
    • 2 篇 力学(可授工学、理...
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 仪器科学与技术
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 农业工程
    • 1 篇 生物医学工程(可授...
  • 75 篇 理学
    • 70 篇 数学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 5 篇 系统科学
    • 4 篇 生物学
    • 2 篇 化学
    • 1 篇 大气科学
  • 13 篇 管理学
    • 10 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 17 篇 theory of comput...
  • 14 篇 software enginee...
  • 13 篇 mathematical log...
  • 13 篇 semantics
  • 13 篇 artificial intel...
  • 11 篇 computation by a...
  • 10 篇 logics and meani...
  • 10 篇 algorithm analys...
  • 9 篇 programming lang...
  • 9 篇 computer softwar...
  • 8 篇 software enginee...
  • 8 篇 model checking
  • 8 篇 data structures
  • 7 篇 system analysis
  • 6 篇 data structures ...
  • 6 篇 mathematics of c...
  • 5 篇 computer system ...
  • 5 篇 programming tech...
  • 5 篇 differentiation ...
  • 4 篇 computability an...

机构

  • 8 篇 univ leicester d...
  • 6 篇 univ london impe...
  • 4 篇 max planck inst ...
  • 4 篇 rhein westfal th...
  • 3 篇 imperial coll lo...
  • 3 篇 max planck inst ...
  • 3 篇 university of tw...
  • 3 篇 university of ox...
  • 2 篇 department of co...
  • 2 篇 univ sci & tech ...
  • 2 篇 rhein westfal th...
  • 2 篇 univ bologna dip...
  • 2 篇 fakultät für inf...
  • 2 篇 cnrs
  • 2 篇 cwi dept softwar...
  • 2 篇 univ warwick dep...
  • 2 篇 univ oxford dept...
  • 2 篇 univ london impe...
  • 2 篇 rhein westfal th...
  • 2 篇 tel aviv univ sc...

作者

  • 4 篇 pattinson dirk
  • 3 篇 ulidowski irek
  • 3 篇 edalat abbas
  • 3 篇 kurz alexander
  • 3 篇 zavattaro g
  • 3 篇 uustalu tarmo
  • 3 篇 heckel reiko
  • 3 篇 phillips iain
  • 2 篇 rabinovich alexa...
  • 2 篇 james worrell
  • 2 篇 hu liqiang
  • 2 篇 busi n
  • 2 篇 carlos martín-vi...
  • 2 篇 yoshida nobuko
  • 2 篇 schroeder lutz
  • 2 篇 sagiv mooly
  • 2 篇 noll thomas
  • 2 篇 naoki kobayashi
  • 2 篇 haase christoph
  • 2 篇 katoen joost-pie...

语言

  • 219 篇 英文
  • 5 篇 其他
  • 5 篇 中文
检索条件"任意字段=7th International Conference on Foundations of Software Science and Computation Structures"
228 条 记 录,以下是81-90 订阅
排序:
Graph Transformation - 7th international conference, ICGT 2014, Held as Part of STAF 2014, Proceedings
Graph Transformation - 7th International Conference, ICGT 20...
收藏 引用
7th international conference on Graph Transformation, ICGT 2014, Held as Part of software Technologies: Applications and foundations, STAF 2014
the proceedings contain 18 papers. the topics discussed include: verifying monadic second-order properties of graph programs;generating abstract graph-based procedure summaries for pointer programs;generating inductiv...
来源: 评论
Transformation of Attributed structures with Cloning
Transformation of Attributed Structures with Cloning
收藏 引用
17th international conference on the foundations of software science and computation structures (FOSSACS) Held as Part of the European Joint conferences on theory and Practice of software (ETAPS)
作者: Duval, Dominique Echahed, Rachid Prost, Frederic Ribeiro, Leila Univ Grenoble LJK Grenoble France Univ Grenoble LIG Grenoble France Univ Fed Rio Grande do Sul INF Porto Alegre RS Brazil
Copying, or cloning, is a basic operation used in the specification of many applications in computer science. However, when dealing with complex structures, like graphs, cloning is not a straightforward operation sinc... 详细信息
来源: 评论
Mining the Categorized software Repositories to Improve the Analysis of Security Vulnerabilities
Mining the Categorized Software Repositories to Improve the ...
收藏 引用
17th international conference on the foundations of software science and computation structures (FOSSACS) Held as Part of the European Joint conferences on theory and Practice of software (ETAPS)
作者: Sadeghi, Alireza Esfahani, Naeem Malek, Sam George Mason Univ Dept Comp Sci Fairfax VA 22030 USA
Security has become the Achilles' heel of most modern software systems. Techniques ranging from the manual inspection to automated static and dynamic analyses are commonly employed to identify security vulnerabili... 详细信息
来源: 评论
Automatic Program Repair by Fixing Contracts
Automatic Program Repair by Fixing Contracts
收藏 引用
17th international conference on the foundations of software science and computation structures (FOSSACS) Held as Part of the European Joint conferences on theory and Practice of software (ETAPS)
作者: Pei, Yu Furia, Carlo A. Nordio, Martin Meyer, Bertrand Swiss Fed Inst Technol Chair Software Engn Zurich Switzerland
While most debugging techniques focus on patching implementations, there are bugs whose most appropriate corrections consist in fixing the specification to prevent invalid executions-such as to define the correct inpu... 详细信息
来源: 评论
Target Oriented Relational Model Finding
Target Oriented Relational Model Finding
收藏 引用
17th international conference on the foundations of software science and computation structures (FOSSACS) Held as Part of the European Joint conferences on theory and Practice of software (ETAPS)
作者: Cunha, Alcino Macedo, Nuno Guimaraes, Tiago INESC TEC HASLab High Assurance Software Lab Braga Portugal Univ Minho Braga Portugal
Model finders are becoming useful in many software engineering problems. Kodkod [19] is one of the most popular, due to its support for relational logic (a combination of first order logic with relational algebra oper... 详细信息
来源: 评论
Formal Verification of Medical Device User Interfaces Using PVS
Formal Verification of Medical Device User Interfaces Using ...
收藏 引用
17th international conference on the foundations of software science and computation structures (FOSSACS) Held as Part of the European Joint conferences on theory and Practice of software (ETAPS)
作者: Masci, Paolo Zhang, Yi Jones, Paul Curzon, Paul thimbleby, Harold Queen Mary Univ London Sch Elect Engn & Comp Sci London England US FDA Ctr Device & Radiol Hlth Silver Spring MD USA Swansea Univ Future Interact Technol Lab FIT Lab Swansea W Glam Wales
We present a formal verification approach for detecting design issues related to user interaction, with a focus on user interface of medical devices. the approach makes a novel use of configuration diagrams proposed b... 详细信息
来源: 评论
RevVis: Visualization of structures and Properties in Reversible Circuits
RevVis: Visualization of Structures and Properties in Revers...
收藏 引用
6th international conference on Reversible computation (RC)
作者: Wille, Robert Stoppe, Jannis Schoenborn, Eleonora Datta, Kamalika Drechsler, Rolf Univ Bremen Inst Comp Sci D-28359 Bremen Germany DFKI GmbH Cyber Phys Syst D-28359 Bremen Germany Bengal Engn Dept Informat Technol Howrah India
the recent interest in reversible computation led to plenty of ( automatic) approaches for the design of the corresponding circuits. While this automation is desired in order to provide a proper support for the design... 详细信息
来源: 评论
7th international conference on Intelligent Systems and Knowledge Engineering, ISKE 2012
7th International Conference on Intelligent Systems and Know...
收藏 引用
7th international conference on Intelligent Systems and Knowledge Engineering, ISKE 2012
the proceedings contain 64 papers. the special focus in this conference is on Intelligent Systems and Knowledge Engineering. the topics include: Function set-valued information systems;neutrality in bipolar structures...
来源: 评论
JTACO: Test execution for faster bounded verification
收藏 引用
8th international conference on Tests and Proofs, TAP 2014, Held as Part of the software Technologies: Applications and foundations, STAF 2014
作者: Kampmann, Alexander Galeotti, Juan Pablo Zeller, Andreas Software Engineering Department Saarland University Saarbrücken Germany Saarbrücken Graduate School of Computer Science Saarland University Saarbrücken Germany
In bounded program verification a finite set of execution traces is exhaustively checked in order to find violations to a given specification (i.e. errors). SAT-based bounded verifiers rely on SAT-Solvers as their bac... 详细信息
来源: 评论
Fatal Attractors in Parity Games
Fatal Attractors in Parity Games
收藏 引用
16th international conference on foundations of software science and computation structures (FOSSACS) Held as Part of the European Joint conferences on theory and Practice of software (ETAPS)
作者: Huth, Michael Kuo, Jim Huan-Pu Piterman, Nir Imperial Coll London Dept Comp London SW7 2AZ England Univ Leicester Dept Comp Sci Leicester LE1 7RH Leics England
We study a new form of attractor in parity games and use it to define solvers that run in PTIME and are partial in that they do not solve all games completely. Technically, for color c this new attractor determines wh... 详细信息
来源: 评论