Nome |
# |
Fixed-point Elimination in the Intuitionistic Propositional Calculus, file dfa8b99f-d4fe-748b-e053-3a05fe0a3a96
|
256
|
Combining word problems through rewriting in categories with products, file dfa8b990-7f68-748b-e053-3a05fe0a3a96
|
211
|
Delta-BPMN: A Concrete Language and Verifier for Data-Aware BPMN, file dfa8b9a7-d85b-748b-e053-3a05fe0a3a96
|
197
|
Modularity results for interpolation, amalgamation and superamalgamation, file dfa8b99a-e6b8-748b-e053-3a05fe0a3a96
|
192
|
Quantifier-free Interpolation of a Theory of Arrays, file dfa8b990-a635-748b-e053-3a05fe0a3a96
|
148
|
Admissible Bases Via Stable Canonical Rules, file dfa8b994-e994-748b-e053-3a05fe0a3a96
|
146
|
Verification of data-aware processes : challenges and opportunities for automated reasoning, file dfa8b9a1-6b1b-748b-e053-3a05fe0a3a96
|
128
|
SMT-based verification of data-aware processes: a model-theoretic approach, file dfa8b9a1-aa64-748b-e053-3a05fe0a3a96
|
112
|
Counter simulations via higher order quantifier elimination : a preliminary report, file dfa8b999-86bd-748b-e053-3a05fe0a3a96
|
111
|
Counting Constraints in Flat Array Fragments, file dfa8b996-c385-748b-e053-3a05fe0a3a96
|
101
|
Higher-Order Quantifier Elimination, Counter Simulations and Fault-Tolerant Systems, file dfa8b9a3-aa0e-748b-e053-3a05fe0a3a96
|
101
|
A model-theoretic characterization of monadic second order logic on infinite words, file dfa8b997-f2f9-748b-e053-3a05fe0a3a96
|
91
|
A formal verification of ARPON - a tool for avoiding Man-in-the-Middle attacks in Ethernet networks, file dfa8b9a9-8af2-748b-e053-3a05fe0a3a96
|
90
|
Free Heyting algebra endomorphisms: Ruitenburg’s Theorem and beyond, file dfa8b9a1-8135-748b-e053-3a05fe0a3a96
|
81
|
EXISTENTIALLY CLOSED BROUWERIAN SEMILATTICES, file dfa8b9a0-6b02-748b-e053-3a05fe0a3a96
|
71
|
Computing Uniform Interpolants for EUF via (conditional) DAG-based Compact Representations, file dfa8b9a4-3a1a-748b-e053-3a05fe0a3a96
|
64
|
Unification in lax logic, file dfa8b9a9-80e6-748b-e053-3a05fe0a3a96
|
51
|
Safety Verification and Universal Invariants for Relational Action Bases, file 9e77dba5-dd3f-4094-bd82-5fadfa69d974
|
45
|
Model Completeness, Uniform Interpolants and Superposition Calculus (With Applications to Verification of Data-Aware Processes), file dfa8b9a7-c696-748b-e053-3a05fe0a3a96
|
44
|
Admissible Bases Via Stable Canonical Rules, file dfa8b995-5b7f-748b-e053-3a05fe0a3a96
|
25
|
Interpolation and Uniform Interpolation in Quantifier-Free Fragments of Combined First-Order Theories, file dfa8b9a9-bc50-748b-e053-3a05fe0a3a96
|
24
|
A model-theoretic characterization of monadic second order logic on infinite words, file dfa8b998-7a80-748b-e053-3a05fe0a3a96
|
18
|
Combination of Uniform Interpolants via Beth Definability, file 82a00eb3-350a-4aa8-bc3c-2c847b305a1c
|
15
|
Second Order Quantifier Elimination: Towards Verification Applications, file dfa8b99b-8202-748b-e053-3a05fe0a3a96
|
15
|
Counting constraints in flat array fragments, file dfa8b9a0-237b-748b-e053-3a05fe0a3a96
|
14
|
Computing Uniform Interpolants for EUF via (conditional) DAG-based Compact Representations, file dfa8b9a4-414c-748b-e053-3a05fe0a3a96
|
13
|
UNIFORM INTERPOLANTS IN EUF: ALGORITHMS USING DAG-REPRESENTATIONS, file dfa8b9aa-71d6-748b-e053-3a05fe0a3a96
|
13
|
Model Completeness, Uniform Interpolants and Superposition Calculus (With Applications to Verification of Data-Aware Processes), file dfa8b9a8-8e74-748b-e053-3a05fe0a3a96
|
12
|
Diego’s Theorem for nuclear implicative semilattices, file dfa8b9a4-c672-748b-e053-3a05fe0a3a96
|
11
|
SMT-based approaches to Model Checking of Distributed Broadcast Algorithms, file dfa8b998-ab2d-748b-e053-3a05fe0a3a96
|
9
|
AXDInterpolator: A Tool for Computing Interpolants for Arrays with MaxDif, file dfa8b9a8-1db9-748b-e053-3a05fe0a3a96
|
9
|
Admissibility of Π2-Inference Rules: interpolation, model completion, and contact algebras, file a03ffc22-c6ae-4ba5-a1d7-c747bcf2d6be
|
6
|
Booster : an Acceleration-Based Verification Framework for Array Programs, file dfa8b991-666b-748b-e053-3a05fe0a3a96
|
6
|
Monadic second order logic as the model companion of temporal logic, file dfa8b995-4171-748b-e053-3a05fe0a3a96
|
5
|
Counting constraints in flat array fragments, file dfa8b998-c93d-748b-e053-3a05fe0a3a96
|
5
|
Multiple-conclusion rules, hypersequents syntax and step frames, file dfa8b9a2-163c-748b-e053-3a05fe0a3a96
|
5
|
Counter abstractions in model checking of distributed broadcast algorithms: some case studies, file dfa8b996-9344-748b-e053-3a05fe0a3a96
|
4
|
Cardinality constraints for arrays (decidability results and applications), file dfa8b998-c32c-748b-e053-3a05fe0a3a96
|
4
|
SMT-based verification of data-aware processes: a model-theoretic approach, file dfa8b9a2-8315-748b-e053-3a05fe0a3a96
|
4
|
Ruitenburg's Theorem via Duality and Bounded Bisimulations, file dfa8b99b-e68c-748b-e053-3a05fe0a3a96
|
3
|
Formal Verification of Storm Topologies - Supplementary Material, file f539a01f-e4d7-4711-89a7-5e72337bd991
|
3
|
The Invariance Modality, file b1df64b8-d4fd-455c-bfbd-62a1568631d6
|
2
|
Free Heyting algebra endomorphisms: Ruitenburg’s Theorem and beyond, file dfa8b9a1-002e-748b-e053-3a05fe0a3a96
|
2
|
Petri Nets with Parameterised Data : Modelling and Verification, file dfa8b9a3-4eaf-748b-e053-3a05fe0a3a96
|
2
|
Interpolation and Amalgamation for Arrays with MaxDiff, file dfa8b9a6-6126-748b-e053-3a05fe0a3a96
|
2
|
Admissibility of Π2-Inference Rules: interpolation, model completion, and contact algebras, file 92f09f09-a645-49d1-a1dc-0e870177c85b
|
1
|
The bounded proof property via step algebras and step frames, file dfa8b991-620d-748b-e053-3a05fe0a3a96
|
1
|
An extension of lazy abstraction with interpolation for programs with arrays, file dfa8b991-65f3-748b-e053-3a05fe0a3a96
|
1
|
Unified Correspondence, file dfa8b991-873c-748b-e053-3a05fe0a3a96
|
1
|
Decision procedures for flat array properties, file dfa8b992-3105-748b-e053-3a05fe0a3a96
|
1
|
A new Acceleration-based Combination Framework for Array Properties, file dfa8b993-3cd7-748b-e053-3a05fe0a3a96
|
1
|
LTL over description logic axioms, file dfa8b994-967d-748b-e053-3a05fe0a3a96
|
1
|
One-Step Heyting Algebras and Hypersequent Calculi with the Bounded Proof Property, file dfa8b997-06ae-748b-e053-3a05fe0a3a96
|
1
|
A Framework for the Verification of Parameterized Infinite-state Systems, file dfa8b997-6a7a-748b-e053-3a05fe0a3a96
|
1
|
Formal verification of data-intensive applications through model checking modulo theories, file dfa8b999-5990-748b-e053-3a05fe0a3a96
|
1
|
Interpolation, amalgamation and combination : the non-disjoint signatures case, file dfa8b999-97ee-748b-e053-3a05fe0a3a96
|
1
|
Model Checking: Teoria ed Applicazioni, file dfa8b99c-0b6d-748b-e053-3a05fe0a3a96
|
1
|
From model completeness to verification of data aware processes, file dfa8b99e-61e3-748b-e053-3a05fe0a3a96
|
1
|
Formal Modeling and SMT-Based Parameterized Verification of Data-Aware BPMN, file dfa8b99f-5ff7-748b-e053-3a05fe0a3a96
|
1
|
Model Completeness, Covers and Superposition, file dfa8b99f-78b7-748b-e053-3a05fe0a3a96
|
1
|
EXISTENTIALLY CLOSED BROUWERIAN SEMILATTICES, file dfa8b9a0-cf5b-748b-e053-3a05fe0a3a96
|
1
|
Combined Covers and Beth Definability, file dfa8b9a2-9d20-748b-e053-3a05fe0a3a96
|
1
|
Model Completeness and Π2 -rules: the case of Contact Algebras, file dfa8b9a3-1ab7-748b-e053-3a05fe0a3a96
|
1
|
AXDInterpolator: A Tool for Computing Interpolants for Arrays with MaxDif, file dfa8b9a7-c64b-748b-e053-3a05fe0a3a96
|
1
|
Totale |
2.490 |