Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
VeriFast - MaRDI portal

VeriFast

From MaRDI portal
Software:19722



swMATH7705MaRDI QIDQ19722


No author found.





Related Items (68)

Formal verification of parallel prefix sum and stream compaction algorithms in CUDAVerifying Array Manipulating Programs with Full-Program InductionAutomated Verification of Parallel Nested DFSConcise Read-Only Specifications for Better Synthesis of Programs with PointersLocal Reasoning for Global Graph PropertiesCrowfoot: A Verifier for Higher-Order Store ProgramsAutomatic Inference of Access PermissionsAutomating Induction with an SMT SolverSymbolic execution proofs for higher order store programsFormal verification of a Java component using the RESOLVE frameworkDeductive synthesis of programs with pointers: techniques, challenges, opportunities (invited paper)Ghost signals: verifying termination of busy waitingCaperDisproving Inductive Entailments in Separation Logic via Base Pair ApproximationAbstraction and subsumption in modular verification of C programsTwo for the Price of One: Lifting Separation Logic AssertionsGeneralized arrays for Stainless framesInstrumenting a weakest precondition calculus for counterexample generationShape Neutral Analysis of Graph-based Data-structuresFeatherweight VeriFastModel Checking MSVL Programs Based on Dynamic Symbolic ExecutionTraits: correctness-by-construction for freeA theorem prover for Boolean BIVerifying data- and control-oriented properties combining static and runtime verification: theory and toolsCompositional Invariant Checking for Overlaid and Nested Linked ListsAutomating Theorem Proving with SMTA Program Construction and Verification Tool for Separation LogicSpecification patterns for reasoning about recursion through the storeStepwise refinement of heap-manipulating code in ChaliceUsing formal reasoning on a model of tasks for FreeRTOSUnified Reasoning About Robustness Properties of Symbolic-Heap Separation LogicPredicate extension of symbolic memory graphs for the analysis of memory safety correctnessDeductive verification of floating-point Java programs in KeYA generic framework for symbolic execution: a coinductive approachExpressive modular fine-grained concurrency specificationRGITL: a temporal logic framework for compositional reasoning about interleaved programsVerification of Concurrent Systems with VerCorsOne Logic to Use Them AllAutomatic verification of Java programs with dynamic framesA Shape Analysis for Non-linear Data StructuresViper: A Verification Infrastructure for Permission-Based ReasoningBackwards and forwards with separation logicDafny: An Automatic Program Verifier for Functional CorrectnessInterleaving Symbolic Execution and Partial EvaluationStatic Contract Checking with Abstract InterpretationExploiting pointer analysis in memory models for deductive verificationSound, Modular and Compositional Verification of the Input/Output Behavior of ProgramsA Basis for Verifying Multi-threaded ProgramsUnifying separation logic and region logic to allow interoperabilitySimpler proofs with decentralized invariantsSpecification Patterns and Proofs for Recursion through the StoreTractable Reasoning in a Fragment of Separation LogicA relational shape abstract domainAutomatic Parallelization and Optimization of Programs by Proof RewritingA Machine-Checked Framework for Relational Separation LogicModel checking for symbolic-heap separation logic with inductive predicatesCharge!Considerate Reasoning and the Composite Design PatternEfficient verification of imperative programs using auto2Automating deductive verification for weak-memory programsInvariants Synthesis over a Combined Domain for Automated Program VerificationProving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest SenderPractical abstractions for automated verification of shared-memory concurrencyA verification-driven framework for iterative design of controllersVerifying Whiley programs with BoogieOn Symbolic Heaps Modulo Permission TheoriesBehavioral interface specification languagesA Decision Procedure for Guarded Separation Logic Complete Entailment Checking for Separation Logic with Inductive Definitions


This page was built for software: VeriFast