1 | -- | 0 | Dan Craigen, Donald I. Good. Overview of verification systems |
2 | -- | 4 | David R. Musser. AIDS to hierarchical specification structuring and reusing theorems in AFFIRM-85 |
5 | -- | 6 | Michael K. Smith, Richard M. Cohen. Gypsy verification environment: status |
7 | -- | 14 | Leo Marcus, Stephen D. Crocker, Jaisook Landauer. SDVS: a system for verifying microcode correctness |
15 | -- | 16 | Stephen D. Crocker. Engineering requirements for production quality verification systems |
17 | -- | 18 | Steven T. Eckmann, Richard A. Kemmerer. INATEST: an interactive environment for testing formal specifications |
19 | -- | 25 | Daniel M. Berry. An Ina Jo® proof manager for the formal development method |
26 | -- | 27 | Dan Putnam. The VERUS™ design verification system |
28 | -- | 32 | Ole-Johan Dahl, Olaf Owe. A presentation of the specification and verification project "ABEL" |
33 | -- | 34 | Dan Craigen, Mark Saaltink. An EVES update |
35 | -- | 36 | S. Kamal Abdali, Ralph L. London. Exploiting workstations and displays in verification systems |
37 | -- | 40 | Susan L. Gerhart. Prolog technology as a basis for verification systems |
41 | -- | 43 | P. Michael Melliar-Smith, John Rushby. The enhanced HDM system for specification and verification |
44 | -- | 47 | James G. Williams 0002, Charles H. Applebaum. The Practical Verification System Project |
48 | -- | 0 | Donald I. Good, Robert S. Boyer, J. Strother Moore. A second generation verification environment |
49 | -- | 50 | James G. Williams. Components of verification technology |
51 | -- | 52 | Raymond J. Hookway. Verifying Ada programs |
53 | -- | 54 | D. Cooper. Overview of Theorem Proving |
55 | -- | 59 | Nachum Dershowitz, David A. Plaisted. Conditional rewriting |
60 | -- | 0 | Nachum Dershowitz. Rewriting and verification |
61 | -- | 62 | Brian T. Smith. Position paper to be presented at "Verification workshop III (verkshop III)" to be held in Watsonville, CA. Feb. 18-21, 1985 |
63 | -- | 66 | Deepak Kapur, Paliath Narendran. An equational approach to theorem proving in first-order predicate calculus |
67 | -- | 68 | Deepak Kapur, G. Sivakumar. RRL: theorem proving environment based on rewriting techniques |
69 | -- | 0 | Sam Owre. The Sytek theorem prover |
70 | -- | 71 | William F. Wilson, Sam Owre. Programmable heuristics for theorem provers |
72 | -- | 74 | Robert S. Boyer, Matt Kaufmann. A prototype theorem-prover for a higher-order functional language |
75 | -- | 0 | Richard A. Kemmerer. Overview of foundations |
76 | -- | 79 | Janice I. Glasgow, Glenn H. MacEwen. LUCID: a specification language for distributed systems |
80 | -- | 81 | Dan Craigen. Some thoughts arising from a language design effort |
82 | -- | 83 | Mark Saaltink. Relational semantics |
84 | -- | 0 | Friedrich W. von Henke. Reasoning with Hoare sentences |
85 | -- | 87 | John McLean. Two dogmas of program specification |
87 | -- | 89 | . Old-fashioned logic for verification |
90 | -- | 91 | Dan Putnam. Separating methodology and specification constructs |
92 | -- | 94 | Mark R. Pixon. Enhancing FDM for the expression of concurrency requirements |
95 | -- | 96 | Karl N. Levitt, R. Alan Whitehurst. Overview of applications |
97 | -- | 100 | R. Alan Whitehurst. The need for an integrated design, implementation, verification and testing methodology |
101 | -- | 102 | Ben Di Vito. Towards a definition of "Beyond AI" verification |
102 | -- | 104 | Jeannette M. Wing. Beyond functional behavior: combining methods to specify different classes of properties of large systems |
104 | -- | 106 | John McHugh, Karl A. Nyberg. Ada verification using existing tools |
107 | -- | 0 | Carl E. Landwehr. Does program verification help?: how much? |
108 | -- | 109 | Terry C. Vickers Benzel. Verification technology and the A1 criteria |
110 | -- | 0 | Daniel Davis. Resource abstraction and validation |
111 | -- | 112 | Carl E. Landwehr. Some lessons from formalizing a security model |
113 | -- | 116 | Tad Taylor. Verkshop position paper |
116 | -- | 118 | Norman Proctor. The restricted access processor: an example of formal verification |
119 | -- | 125 | William Earl Boebert, Richard Y. Kain. The extended access matrix model of computer security |
126 | -- | 129 | Ruaridh Macdonald. Verifying a real system design: some of the problems |
129 | -- | 130 | R. Stokes. Some formal method activities in UK industry |