<--- Back to Details
First PageDocument Content
Theoretical computer science / Information retrieval / Information science / Model checkers / Hashing / Model checking / Ith / SPIN model checker / Bitstate hashing / Cryptographic hash function / Correctness / Applied mathematics
Date: 2010-09-11 18:27:55
Theoretical computer science
Information retrieval
Information science
Model checkers
Hashing
Model checking
Ith
SPIN model checker
Bitstate hashing
Cryptographic hash function
Correctness
Applied mathematics

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, # 1 Swarm Verification Techniques Gerard J. Holzmann, Rajeev Joshi, and Alex Groce

Add to Reading List

Source URL: rjoshi.org

Download Document from Source Website

File Size: 247,13 KB

Share Document on Facebook

Similar Documents

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity Martin Albrecht1 , Lorenzo Grassi3 , Christian Rechberger2,3 , Arnab Roy2 , and Tyge Tiessen2 1

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity Martin Albrecht1 , Lorenzo Grassi3 , Christian Rechberger2,3 , Arnab Roy2 , and Tyge Tiessen2 1

DocID: 1xUN2 - View Document

Introduction to Locality-Sensitive Hashing Tyler NeylonFormats: html | pdf | kindle pdf] Locality-sensitive hashing (LSH) is a set of techniques that

Introduction to Locality-Sensitive Hashing Tyler NeylonFormats: html | pdf | kindle pdf] Locality-sensitive hashing (LSH) is a set of techniques that

DocID: 1xTR9 - View Document

Proceedings: Equality and Hashing for (Almost) Free: Generating Implementations from Abstraction Functions

Proceedings: Equality and Hashing for (Almost) Free: Generating Implementations from Abstraction Functions

DocID: 1xTdH - View Document