咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 150 篇 工学
    • 130 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 22 篇 电气工程
    • 16 篇 机械工程
    • 13 篇 建筑学
    • 12 篇 控制科学与工程
    • 7 篇 信息与通信工程
    • 6 篇 电子科学与技术(可...
    • 1 篇 仪器科学与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 19 篇 理学
    • 14 篇 数学
    • 3 篇 系统科学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 13 篇 艺术学
    • 13 篇 设计学(可授艺术学...
  • 11 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...

主题

  • 40 篇 analytical model...
  • 38 篇 computational mo...
  • 31 篇 formal methods
  • 25 篇 hardware
  • 22 篇 software
  • 16 篇 model checking
  • 16 篇 state-space meth...
  • 15 篇 semantics
  • 15 篇 data models
  • 14 篇 computer archite...
  • 14 篇 mathematical mod...
  • 13 篇 safety
  • 13 篇 automata
  • 12 篇 software enginee...
  • 12 篇 clocks
  • 12 篇 verification
  • 12 篇 formal verificat...
  • 11 篇 algorithm design...
  • 11 篇 adaptation model...
  • 10 篇 computer science

机构

  • 3 篇 sri internationa...
  • 3 篇 cyber-physical s...
  • 3 篇 univ twente form...
  • 3 篇 univ calif berke...
  • 2 篇 johannes kepler ...
  • 2 篇 sri int menlo pk...
  • 2 篇 computer enginee...
  • 2 篇 dfki gmbh cyber ...
  • 2 篇 iit delhi
  • 2 篇 berlin institute...
  • 2 篇 agh university o...
  • 2 篇 university of ca...
  • 2 篇 johannes kepler ...
  • 2 篇 department of el...
  • 2 篇 univ twente ensc...
  • 2 篇 department of co...
  • 2 篇 eindhoven univ t...
  • 2 篇 univ oxford dept...
  • 2 篇 mit comp sci & a...
  • 2 篇 software modelin...

作者

  • 4 篇 schneider klaus
  • 4 篇 zaytsev vadim
  • 4 篇 teich juergen
  • 3 篇 talpin jean-pier...
  • 3 篇 nils przigoda
  • 3 篇 robert wille
  • 3 篇 rolf drechsler
  • 3 篇 gupta rajesh
  • 2 篇 ruchkin ivan
  • 2 篇 t. basten
  • 2 篇 umeno shinya
  • 2 篇 lim hongping
  • 2 篇 axel legay
  • 2 篇 chao wang
  • 2 篇 o. sarbishei
  • 2 篇 hoe james c.
  • 2 篇 nathan allen
  • 2 篇 sanjiva prasad
  • 2 篇 allison sullivan
  • 2 篇 mitra sayan

语言

  • 309 篇 英文
检索条件"任意字段=IEEE/ACM International Conference on Formal Methods and Models for Codesign"
309 条 记 录,以下是81-90 订阅
排序:
Verifying Absence of Hardware-Software Data Races using Counting Abstraction
Verifying Absence of Hardware-Software Data Races using Coun...
收藏 引用
acm and ieee international conference on formal methods and models for Co-Design (MEMOCODE)
作者: Tuba Yavuz University of Florida Gainesville FL USA
Device drivers are critical components of operating systems. However, due to their interactions with the hardware and being embedded in complex programming models implemented by the operating system, ensuring reliabil... 详细信息
来源: 评论
Security-Driven Metrics and models for Efficient Evaluation of Logic Encryption Schemes  19
Security-Driven Metrics and Models for Efficient Evaluation ...
收藏 引用
17th acm-ieee Inter- national conference on formal methods and models for System Design (MEMOCODE)
作者: Hu, Yinghua Menon, Vivek V. Schmidt, Andrew Monson, Joshua French, Matthew Nuzzo, Pierluigi Univ Southern Calif Dept Elect & Comp Engn Los Angeles CA 90007 USA Univ Southern Calif Inst Informat Sci Arlington VA USA
Research in logic encryption over the last decade has resulted in various techniques to prevent different security threats such as Trojan insertion, intellectual property leakage, and reverse engineering. However, the... 详细信息
来源: 评论
Security Types for Synchronous Data Flow Systems
Security Types for Synchronous Data Flow Systems
收藏 引用
acm and ieee international conference on formal methods and models for Co-Design (MEMOCODE)
作者: Sanjiva Prasad R.Madhukar Yerraguntla Subodh Sharma IIT Delhi India
Synchronous reactive data flow is a paradigm that provides a high-level abstract programming model for embedded and cyber-physical systems, including the locally synchronous components of IoT systems. Security in such... 详细信息
来源: 评论
Lightweight formal Method for Robust Routing in Track-based Traffic Control Systems
Lightweight Formal Method for Robust Routing in Track-based ...
收藏 引用
acm and ieee international conference on formal methods and models for Co-Design (MEMOCODE)
作者: Maryam Bagheri Edward A. Lee Eunsuk Kang Marjan Sirjani Ehsan Khamespanah Ali Movaghar Sharif University of Technology Tehran Iran University of California at Berkeley Berkeley California USA Carnegie Mellon University Pittsburgh Pennsylvania USA Reykjavik University Mälardalen University Västeras Sweden University of Tehran Tehran Iran
In this paper, we propose a robust solution for the path planning and scheduling of the moving objects in a Track-based Traffic Control System (TTCS). The moving objects in a TTCS pass over pre-specified sub-tracks. E... 详细信息
来源: 评论
formal Modeling and Verification of Rate Adaptive Pacemakers for Heart Failure
Formal Modeling and Verification of Rate Adaptive Pacemakers...
收藏 引用
acm and ieee international conference on formal methods and models for Co-Design (MEMOCODE)
作者: Moon Soo Kim Weiwei Ai Partha S Roop Nathan Allen Rohit Ramchandra Julian Paton University of Auckland Auckland New Zealand Faculty of Medical and Health Sciences University of Auckland Auckland New Zealand
Cardiovascular Implantable Electronic Devices (CIEDs) are routinely implanted to treat various types of arrhythmia. However, conventional pacing algorithms may not be able to provide optimal treatment for the patients... 详细信息
来源: 评论
Semantic source code models using identifier embeddings  16
Semantic source code models using identifier embeddings
收藏 引用
16th ieee/acm international conference on Mining Software Repositories, MSR 2019
作者: Efstathiou, Vasiliki Spinellis, Diomidis Athens University of Economics and Business Greece
The emergence of online open source repositories in the recent years has led to an explosion in the volume of openly available source code, coupled with metadata that relate to a variety of software development activi... 详细信息
来源: 评论
Securing Smart Contracts in Blockchain  34
Securing Smart Contracts in Blockchain
收藏 引用
34th ieee/acm international conference on Automated Software Engineering (ASE)
作者: Kongmanee, Jaturong Kijsanayothin, Phongphun Hewett, Rattikorn Texas Tech Univ Comp Sci Lubbock TX 79409 USA Naresuan Univ Elect & Comp Engn Phitsanulok Thailand
Blockchain is an emerging technology that underlies creation and exchange of the digital assets, including cryptocurrency such as Bitcoin and Ether, without the need for a central authority. It provides a public ledge... 详细信息
来源: 评论
Bayesian Statistical Model Checking for Continuous Stochastic Logic
Bayesian Statistical Model Checking for Continuous Stochasti...
收藏 引用
acm and ieee international conference on formal methods and models for Co-Design (MEMOCODE)
作者: Ratan Lal Weikang Duan Pavithra Prabhakar Kansas State University Manhattan Kansas USA
In this paper, we propose a Bayesian approach to statistical model-checking (SMC) of discrete-time Markov chains with respect to continuous stochastic logic (CSL) specifications. While Bayesian approaches for simpler ... 详细信息
来源: 评论
UML Consistency Rules: a Case Study with Open-Source UML models
UML Consistency Rules: a Case Study with Open-Source UML Mod...
收藏 引用
FME Workshop on formal methods in Software Engineering (formaliSE)
作者: Damiano Torre Yvan Labiche Marcela Genero Maged Elaasar Claudio Menghi University of Luxembourg Luxembourg Carleton University Ottawa Canada University of Castilla-La Mancha Ciudad Real Spain
UML models are standard artifacts used by software engineers for designing software. As software is designed, different UML diagram types (e.g., class diagrams and sequence diagrams) are produced by software designers...
来源: 评论
Detecting Security Leaks in Hybrid Systems with Information Flow Analysis  19
Detecting Security Leaks in Hybrid Systems with Information ...
收藏 引用
17th acm-ieee Inter- national conference on formal methods and models for System Design (MEMOCODE)
作者: Luan Viet Nguyen Mohan, Gautam Weimer, James Sokolsky, Oleg Lee, Insup Alur, Rajeev Univ Penn Philadelphia PA 19104 USA
Information flow analysis is an effective way to check useful security properties, such as whether secret information can leak to adversaries. Despite being widely investigated in the realm of programming languages, i... 详细信息
来源: 评论