(TFCS)Mathematical logic for computer science
Probabilistic Analysis of Safe Return to Port (Public Version)
Theory Generation for Security Protocols
Ruhr- Universität Bochum Fakultät für Mathematik Informationssicherheit und Kryptologie Solving Systems of Equations with Incompatible Operations CITS.
Symbolic Simulation based Transient Fault Injection Methodology Ashish Darbari and Bashir Al Hashimi Technical Report No. 15376 Electronics and Computer.
March 8, 20071 Dynamic Fault Tree analysis using Input/Output Interactive Markov Chains Hichem Boudali, Pepijn Crouzen, and Mariëlle Stoelinga. Formal.
Presentation Slides - Theory Generation for Security Protocols
Genetic algorithm
Oblivious Branching Program Evaluation Payman Mohassel and Salman Niksefat University of Calgary.
Www.itu.dk 1 Knowledge Compilation Properties of Tree-of-BDDs Sathiamoorthy Subbarayan AAAI-2007, Vancouver Lucas Bordeaux, Youssef Hamadi IT University.
COE 561 Digital System Design & Synthesis Introduction Dr. Aiman H. El-Maleh Computer Engineering Department King Fahd University of Petroleum & Minerals.
Checking Properties Of Software Static Safety Verification Dynamic Liveness Testing.