The Constraint Database Approach to Software Verification
DOI10.1007/978-3-540-69738-1_24zbMATH Open1132.68339OpenAlexW1602949508MaRDI QIDQ5452618FDOQ5452618
Authors: P. Z. Revesz
Publication date: 4 April 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-69738-1_24
Recommendations
Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30) Database theory (68P15) Specification and verification (program logics, model checking, etc.) (68Q60)
Cited In (5)
- Pentagons: a weakly relational abstract domain for the efficient validation of array accesses
- Title not available (Why is that?)
- Tools and Algorithms for the Construction and Analysis of Systems
- Estimating the maximum rise in temperature according to climate models using abstract interpretation
- Space-time tradeoffs in negative cycle detection - an empirical analysis of the stressing algorithm
Uses Software
This page was built for publication: The Constraint Database Approach to Software Verification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5452618)