@inproceedings{NM07,
title = { AMT: A Property-Based Monitoring Tool for Analog Systems },
author = {Nickovic, Dejan and Maler, Oded},
year = {2007},
booktitle = {FORMATS},
pages = {304-319},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {4763},
team = {TEMPO},
}
bibtex
Navigation
Actualités
Séminaires
Nouvelles publications
- Quelques Publications
Récentes
- Marius Bozga, Lucas Bueri, Radu Iosif: On an Invariance Problem for Parameterized Concurrent Systems
- Karine Altisen, Alain Cournier, Geoffrey Defalque, Stéphane Devismes: Self-stabilizing Synchronous Unison in Directed Networks
- Mnacho Echenim, Radu Iosif, Nicolas Peltier: Entailment is Undecidable for Symbolic Heap Separation Logic Formul\ae with Non-Established Inductive Rules
- Thomas VIGOUROUX, Cristian Ene, David Monniaux, Laurent Mounier, Marie-Laure Potet: BAXMC: a CEGAR approach to Max\# SAT
Offres d'emploi et stages
- Offres d'emploi et stages
- [Master] Implementation of critical applications on multi-core : execution mode analysis to reduce interferences
- Bourses PERSYVAL de M2
- Measures against speculative attacks in a certified optimizing compiler
- Poste de maître de conférences VERIMAG / UFR IM2AG
- Security counter-measures in a certified optimizing compiler
- Thèse CIFRE : Cybersecurity - Fault injection attacks
- Verified hash tables and hash-consing
- [master/PhD] Formally verified optimizations for safety-critical embedded code
- [master/PhD] Static analysis of “pseudo-LRU” caches
- [Master] Analyzing fault parameters triggering timing anomalies
- [Master] Certification of Distributed Self-Stabilizing Algorithms Using Coq
- [Master] Design and Evaluation of Strategies for Automated Proofs using Reasoning Modulo Equivalence
- [Master] Exploration by model-checking of timing anomaly cancellation in a processor
- [Master] Implementing the Silence to Reduce Energy Consumption in Wireless Sensor Networks
- [Master] Simulation of Distributed Algorithms
- [Master] Sûreté des essaims de robots mobiles
- [Master]Leakage in presence of an active and adaptive adversary
- [PostDoc] Implementation of critical applications on multi-core : execution mode analysis to reduce interferences