TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| A | |
| Abstract interpretation | |
| abstraction | |
| Acceleration | |
| Alloy | |
| Analysis Operations | |
| Android | |
| Android Frameworks | |
| Android security | |
| architectures | |
| Assume-Guarantee Reasoning | |
| auto-active verification | |
| automated theorem proving | |
| automated verification | |
| axiomatisation | |
| B | |
| B-method | |
| BB84 quantum key distribution | |
| biological systems | |
| biometric systems | |
| Bitvectors | |
| bounded model checking | |
| C | |
| camkes | |
| Cardinality-based Feature Models | |
| Certificates | |
| Certification | |
| certified decision procedure | |
| Circular Assume-Guarantee Reasoning | |
| completeness proof | |
| component platform verification | |
| Compositional Verification | |
| Concurrency | |
| constraint programming | |
| container library | |
| continuous systems | |
| correctness criteria for shared memory | |
| Counterexample | |
| cryptography | |
| D | |
| Data Flow Graphs | |
| DCR Graphs | |
| Decidability | |
| declarative process modelling | |
| Distribution Bisimulation | |
| dynamic sub processes | |
| E | |
| elementary function | |
| Energy Consumption | |
| eventuality | |
| Expected Reward | |
| F | |
| fence insertion | |
| Firewall | |
| Floating-point | |
| Formal Languages | |
| formal methods | |
| Formal Modeling | |
| Formal Semantics | |
| Formal verification | |
| Freeze Quantifier | |
| full functional correctness | |
| G | |
| Global Optimization | |
| H | |
| hybrid system | |
| hybrid systems | |
| I | |
| Inductive invariants | |
| interdisciplinarity | |
| invariant | |
| Isabelle | |
| J | |
| Java | |
| JML | |
| K | |
| K Framework | |
| Kerberos V | |
| KeY | |
| KIV Theorem Prover | |
| L | |
| LARVA | |
| Linear Temporal Logic | |
| linear temporal logics | |
| Linearizability | |
| M | |
| Markov Chain | |
| Model Checking | |
| Multi-Constraint | |
| N | |
| Narrowing | |
| netfilter iptables | |
| Network security management | |
| O | |
| object-orientation | |
| Opacity | |
| operating system security | |
| Orc | |
| ordinary differential equations | |
| P | |
| parameter synthesis | |
| Parameterised Protocol | |
| Parameterized systems | |
| Permission-model | |
| privacy by design | |
| Probabilistic Automata | |
| Probabilistic Model | |
| process-aware information systems | |
| program verification | |
| property-driven | |
| Q | |
| quantum computation tree logic QCTL | |
| quantum Markov chain | |
| R | |
| reachability analysis | |
| Realistic Schedulers | |
| Regular Expressions | |
| reorder bounded model checking | |
| Round-off Error Analysis | |
| run-time refinement | |
| runtime verification | |
| S | |
| safety and liveness | |
| Safety verification | |
| SAT Solver | |
| scheduling | |
| Secrecy | |
| Security Protocol Verification | |
| sel4 | |
| Semantics | |
| Service Orchestration | |
| SMT solvers | |
| Software Transactional Memory | |
| Software Verification | |
| software-defined networks | |
| specification | |
| Static Analysis | |
| static differential analysis | |
| STL | |
| Stochastic Model | |
| superdense coding | |
| T | |
| Throughput | |
| Timed Authentication | |
| Timed Automata | |
| Timed Protocol | |
| timetabling | |
| Trace automata | |
| Transactional Mutex Lock | |
| TSO | |
| Turing completeness | |
| typed logic | |
| U | |
| UPPAAL | |
| V | |
| variable transformation | |
| Verification | |
| verified data structures | |
| Vulnerability Analysis | |
| W | |
| Weak memory models | |
| Weighted Timed Automaton | |