@article{BIK4a, 
    title = { Deciding Conditional Termination  }, 
    author = {Bozga, Marius and Iosif, Radu and Konecn{\'y}, Filip},
    year = {2014},
    journal = {Logical Methods in Computer Science},
    number = {3},
    volume = {10},
    team = {RSD, PACSS},
}
bibtex
Navigation
Actualités
-  Conférences 
          
- 24-28 Novembre 2025 Synchron 2025
 
 
Séminaires
-  Séminaires  
      
- 13 novembre 2025 Yann Herklotz: Towards scalable verification and efficient hardware generation using verified (…)
 - 21 novembre 2025 Oussama Oulkaid: Formal models of integrated circuits for transistor level electrical verification (Phd)
 - 25 novembre 2025 Véronique Cortier: Electronic voting: design, attack, and formal verification
 - 1er décembre 2025 Sylvain Boulme: Introduction à la programmation orientée objet en crystal
 - 4 décembre 2025 Jannik Laval: A venir (thème cybersécu)
 - 11 décembre 2025 Thaïs Baudon: A venir (thème: compilation optimisant les représentations mémoire)
 
 
Nouvelles publications
-     Quelques  Publications
 Récentes 
      
   
           
     
      
     
           
     
           
      
     
           
     
           
      
     
           
     
           
      
     
           
     
   
    
   
      
   
- Iulia Dragomir, Carlos Redondo, Tiago Jorge, Laura Gouveia, Iulian Ober, Marius Bozga, Maxime Perrotin: Specification and model-checking of space systems in the TASTE toolset
 - Karine Altisen, Alain Cournier, Geoffrey Defalque, Stéphane Devismes: On Self-stabilizing Leader Election in Directed Networks
 - Basile Pesin, Sylvain Boulmé, David Monniaux, Marie-Laure Potet: Formally Verified Hardening of C Programs against Hardware Fault Injection
 - Akram Idani, Yves Ledru, German Vega: Formal model-driven security combining B-method and process algebra: The B4MSecure platform
 
 
Offres d'emploi et stages
-   Offres d'emploi et stages  
 
- [Funded PhD] Fault Injection Attacks : Automated Analysis of Counter-Measures At The Binary Level
 - [Master] Decision Procedure for Equivalence Relations
 - [Master]Leakage in presence of an active and adaptive adversary
 - [PostDoc] Implementation of critical applications on multi-core : execution mode analysis to reduce interferences