901 | Add to Reading ListSource URL: assets.thoughtworks.comLanguage: English - Date: 2015-03-12 15:18:34
|
---|
902 | Add to Reading ListSource URL: www21.in.tum.deLanguage: English - Date: 2013-06-03 12:43:37
|
---|
903 | Add to Reading ListSource URL: www.networkrail.co.ukLanguage: English |
---|
904 | Add to Reading ListSource URL: www.seas.upenn.eduLanguage: English - Date: 2014-07-10 05:47:18
|
---|
905 | |
---|
906 | FM 2015 Call for Papers 20th International Symposium on Formal Methods Oslo, Norway, 22–26 June 2015 http://fm2015.ifi.uio.no Formal Methods 2015Add to Reading ListSource URL: fm2015.ifi.uio.noLanguage: English - Date: 2014-09-02 17:56:51
|
---|
907 | Formalization and Comparison of MCDC and Object Branch Coverage Criteria Cyrille Comar, Jerome Guitton, Olivier Hainque, Thomas Quinot AdaCore, 46 rue d’Amsterdam, FPARIS (France) {comar, guitton, hainque, quinoAdd to Reading ListSource URL: www.adacore.comLanguage: English - Date: 2012-03-18 14:24:37
|
---|
908 | Formal Specification and Verification of ARM6 M.J.C. Gordon Computer Laboratory University of Cambridge Final Report to EPSRC on grant GR/N13135Add to Reading ListSource URL: www.cl.cam.ac.ukLanguage: English - Date: 2004-06-09 11:49:11
|
---|
909 | BitScope: Automatically Dissecting Malicious Binaries David Brumley, Cody Hartwig, Min Gyung Kang, Zhenkai Liang James Newsome, Pongsin Poosankam, Dawn Song, Heng Yin March 18, 2007 Last Modified: May 23, 2007 CMU-CS-07-Add to Reading ListSource URL: bitblaze.cs.berkeley.eduLanguage: English - Date: 2013-03-28 20:19:28
|
---|
910 | best practices takes ProspectingAdd to Reading ListSource URL: www.stevemcconnell.comLanguage: English - Date: 2007-03-02 18:15:07
|
---|