FM 2015: FORMAL METHODS 2015
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
Abstract interpretation
abstraction
Acceleration
Alloy
Analysis Operations
Android
Android Frameworks
Android security
architectures
Assume-Guarantee Reasoning
auto-active verification
automated theorem proving
automated verification
axiomatisation
B
B-method
BB84 quantum key distribution
biological systems
biometric systems
Bitvectors
bounded model checking
C
camkes
Cardinality-based Feature Models
Certificates
Certification
certified decision procedure
Circular Assume-Guarantee Reasoning
completeness proof
component platform verification
Compositional Verification
Concurrency
constraint programming
container library
continuous systems
correctness criteria for shared memory
Counterexample
cryptography
D
Data Flow Graphs
DCR Graphs
Decidability
declarative process modelling
Distribution Bisimulation
dynamic sub processes
E
elementary function
Energy Consumption
eventuality
Expected Reward
F
fence insertion
Firewall
Floating-point
Formal Languages
formal methods
Formal Modeling
Formal Semantics
Formal verification
Freeze Quantifier
full functional correctness
G
Global Optimization
H
hybrid system
hybrid systems
I
Inductive invariants
interdisciplinarity
invariant
Isabelle
J
Java
JML
K
K Framework
Kerberos V
KeY
KIV Theorem Prover
L
LARVA
Linear Temporal Logic
linear temporal logics
Linearizability
M
Markov Chain
Model Checking
Multi-Constraint
N
Narrowing
netfilter iptables
Network security management
O
object-orientation
Opacity
operating system security
Orc
ordinary differential equations
P
parameter synthesis
Parameterised Protocol
Parameterized systems
Permission-model
privacy by design
Probabilistic Automata
Probabilistic Model
process-aware information systems
program verification
property-driven
Q
quantum computation tree logic QCTL
quantum Markov chain
R
reachability analysis
Realistic Schedulers
Regular Expressions
reorder bounded model checking
Round-off Error Analysis
run-time refinement
runtime verification
S
safety and liveness
Safety verification
SAT Solver
scheduling
Secrecy
Security Protocol Verification
sel4
Semantics
Service Orchestration
SMT solvers
Software Transactional Memory
Software Verification
software-defined networks
specification
Static Analysis
static differential analysis
STL
Stochastic Model
superdense coding
T
Throughput
Timed Authentication
Timed Automata
Timed Protocol
timetabling
Trace automata
Transactional Mutex Lock
TSO
Turing completeness
typed logic
U
UPPAAL
V
variable transformation
Verification
verified data structures
Vulnerability Analysis
W
Weak memory models
Weighted Timed Automaton