@inproceedings{FM07,
title = { Reachability Analysis of a Switched Buffer Network },
author = {Frehse, Goran and Maler, Oded},
year = {2007},
booktitle = {HSCC},
pages = {698-701},
publisher = {Springer},
series = {LNCS},
volume = {4416},
team = {TEMPO},
}
Home > Verimag > Publications
bibtex
Browsing
News
- Seminars
- 17 June 2024 Sylvain Boulme: Toward a ffi (foreign function interface) for embedding untrusted imperative ocaml (…)
- 17 June 2024 Basile Gros: Small inversions in coq
- 18 June 2024 Matthieu Sozeau: Verified extraction from coq to ocaml
- 19 June 2024 Jean-françois Monin: Recent advances on the braga method
- 27 June 2024 Nicolas Chappe: Executable semantics based on choice trees for a concurrent subset of llvm ir
Seminars
New publications
- Some Recent Publications
- David Monniaux, Sylvain Boulmé: Chamois: agile development of CompCert extensions for optimization and security
- David Monniaux, Léo Gourdin, Sylvain Boulmé, Olivier Lebeltel: Testing a Formally Verified Compiler
- Joseph Sifakis: Testing System Intelligence
- Marius Bozga, Radu Iosif, Joseph Sifakis: Verification of component-based systems with recursive architectures
Jobs and internships
- Jobs and internships
- [Master] Implementation of critical applications on multi-core: execution mode analysis to reduce interferences
- PERSYVAL Master 2 Scholarships
- [Funded PhD/PostDoc] Countermeasures to (transient) Side-Channel Attacks in a Formally Verified Compiler
- [Funded PhD] Annotations de sécurité pour compilateur optimisant formellement vérifié
- [Funded PhD] Formal Modeling and Verification of Parameterized and Distributed Systems
- [Funded PhD] Improving Diagnosis for a Formal Verification Tool for Electrical Circuits at Transistor Level
- [Funded PhD] Modular Analysis for Formal Verification of Integrated Circuits at Transistor Level
- [Funded PhD] Quantitative analysis of software security against adaptive attacks
- [Master] Formal Methods for the Verification of Self-Adapting Distributed Systems
- [Master]Leakage in presence of an active and adaptive adversary
- [PostDoc] Implementation of critical applications on multi-core: execution mode analysis to reduce interferences