|
|
VPT 2013: Author Index| Author | Papers |
|---|
| A | | Ahmed, Abdulbasit | Cryptographic Protocol Verification via Supercompilation (A Case Study) | | B | | Ben-Amram, Amir | Ranking Functions for Linear-Constraint Loops | | D | | De Angelis, Emanuele | Verification of Imperative Programs through Transformation of Constraint Logic Programs | | F | | Finkbeiner, Bernd | Transforming Undecidable Synthesis Problems into Decidable Problems | | Fioravanti, Fabio | Verification of Imperative Programs through Transformation of Constraint Logic Programs | | H | | Hamilton, Geoff | On the Termination of Positive Supercompilation | | L | | Leroux, Jerome | Acceleration For Presburger Petri Nets | | Lisitsa, Alexei | Cryptographic Protocol Verification via Supercompilation (A Case Study) | | M | | Mery, Dominique | Transforming Event B Models into Verified C# Implementations | | Monahan, Rosemary | Transforming Event B Models into Verified C# Implementations | | N | | Nemytykh, Andrei | Cryptographic Protocol Verification via Supercompilation (A Case Study) | | Nepeivoda, Antonina | Ping-Pong Protocols as Prefix Grammars and Turchin Relation | | P | | Pettorossi, Alberto | Program Transformation for Program Verification | | Pettorossi, Alberto | Verification of Imperative Programs through Transformation of Constraint Logic Programs | | Proietti, Maurizio | Program Transformation for Program Verification Verification of Imperative Programs through Transformation of Constraint Logic Programs | | T | | Thompson, Simon | Building trustworthy refactoring tools |
|
|
|