SCH

Results: 9450



#Item
1

Conflict-Directed Graph Coverage Daniel Schwartz-Narbonne1 , Martin Sch¨af2 , Dejan Jovanovi´c2 , Philipp R¨ ummer3 , and Thomas Wies1 1

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2015-02-14 13:21:39
    2Electronics / Radio / Telecommunications engineering / Air traffic control / Avionics / OpenSky Network / Radar / Automatic dependent surveillance  broadcast / Wireless / Flightradar24 / Global Positioning System / Data integrity

    OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS-B Data Matthias Sch¨afer¶‡∗ , Martin Strohmeier¶† , Matthew Smith¶† , Markus Fuchs¶‡ , Vincent Lenders¶§ , Ivan Martinovic¶†

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2018-08-23 02:40:40
    3Software engineering / Programming language theory / Computing / Logic in computer science / Horn clause / Control flow / ALGOL 68 / Formal methods / Logic programming

    Finding Inconsistencies in Programs with Loops? Temesghen Kahsai1 , Jorge A. Navas2 , Dejan Jovanovi´c3 , Martin Sch¨af3 1 2

    Add to Reading List

    Source URL: seahorn.github.io

    Language: English - Date: 2018-08-03 20:31:21
    4

    OpenSky Report 2017: Mode S and ADS-B Usage of Military and other State Aircraft Matthias Sch¨afer∗ , Martin Strohmeier† , Matthew Smith† , Markus Fuchs‡ , Vincent Lenders§ , Marc Liechti¶ , Ivan Martinovic†

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2017-10-20 08:53:16
      5Software engineering / Programming language theory / Computing / Logic in computer science / Horn clause / Control flow / ALGOL 68 / Formal methods / Logic programming

      Finding Inconsistencies in Programs with Loops? Temesghen Kahsai1 , Jorge A. Navas2 , Dejan Jovanovi´c3 , Martin Sch¨af3 1 2

      Add to Reading List

      Source URL: csl.sri.com

      Language: English - Date: 2015-09-28 14:39:27
      6Theoretical computer science / Logic in computer science / Mathematical logic / Computational complexity theory / Electronic design automation / Formal methods / NP-complete problems / Constraint programming / Satisfiability modulo theories / Horn clause / Clause / Logic programming

      Abduction by Non-Experts Nikolaj Bjørner2 , Dejan Jovanovi´c1 , Tancr`ede Lepoint1 , Philipp R¨ ummer3 , and 1 Martin Sch¨af 1

      Add to Reading List

      Source URL: csl.sri.com

      Language: English - Date: 2018-04-25 11:34:43
      7Software engineering / Programming language theory / Computing / Logic in computer science / Horn clause / Control flow / ALGOL 68 / Formal methods / Logic programming

      Finding Inconsistencies in Programs with Loops? Temesghen Kahsai1 , Jorge A. Navas2 , Dejan Jovanovi´c3 , Martin Sch¨af3 1 2

      Add to Reading List

      Source URL: jorgenavas.github.io

      Language: English - Date: 2018-10-25 12:43:22
      8Formal methods / Theoretical computer science / Software engineering / Systems engineering / Software testing / Quality / Software quality / Software verification and validation / Formal verification / Functional verification / Model checking / Verification and validation

      On Using Results of Code-level Bounded Model Checking in Assurance Cases Carmen Cˆ arlan, Daniel Ratiu, and Bernhard Sch¨atz fortiss GmbH, Munich, email: Siemens CT, Munich, email: daniel.ratiu@sieme

      Add to Reading List

      Source URL: mbeddr.com

      Language: English - Date: 2018-08-02 04:06:51
      9Software engineering / Programming language theory / Computing / Logic in computer science / Horn clause / Control flow / ALGOL 68 / Formal methods / Logic programming

      Finding Inconsistencies in Programs with Loops? Temesghen Kahsai1 , Jorge A. Navas2 , Dejan Jovanovi´c3 , Martin Sch¨af3 1 2

      Add to Reading List

      Source URL: seahorn.github.io

      Language: English - Date: 2018-08-03 20:31:21
      10Global Positioning System / Avionics / Finance / Economy / Money / Computer network security / Spoofing attack / Navigation / FLARM / Automatic dependent surveillance  broadcast / GPS navigation device / GPS signals

      Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Kai Jansen∗ , Matthias Sch¨afer† , Daniel Moser‡ , Vincent Lenders§ , Christina P¨opper¶ and Jens Schmitt† ∗ Ruhr-Universi

      Add to Reading List

      Source URL: www.lenders.ch

      Language: English - Date: 2018-01-11 04:46:53
      UPDATE