Recherche - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu

Filtrer vos résultats

170 résultats
keyword_s : Formal methods

A Formal Analysis of the Norwegian E-Voting Protocol

Véronique Cortier , Cyrille Wiedling
Journal of Computer Security, 2017, ⟨10.3233/JCS-15777⟩
Article dans une revue hal-01647764v1
Image document

Slimmer Formal Proofs for Mathematical Libraries

Paul Geneau de Lamarlière , Guillaume Melquiond , Florian Faissole
30th IEEE International Symposium on Computer Arithmetic, Sep 2023, Portland (Oregon), United States. pp.4
Communication dans un congrès hal-04165169v1
Image document

Terminaison en temps moyen fini de systèmes de règles probabilistes

Florent Garnier
Modélisation et simulation. Institut National Polytechnique de Lorraine - INPL, 2007. Français. ⟨NNT : 2007INPL055N⟩
Thèse tel-01752898v2
Image document

A Specification and Validation Technique Based on STATEMATE and FNLOG

Olfa Mosbahi , Leila Jemni Ben Ayed , Samir Ben Ahmed , Jacques Jaray
4th International Conference on Formal Engineering Methods - ICFEM 2002, Oct 2002, Shanghai, China. pp.216-220, ⟨10.1007/3-540-36103-0_23⟩
Communication dans un congrès inria-00102167v1

Construction et vérification de spécifications d'Interfaces Homme-Machine

Franck Chalaux
[Stage] 98-R-370 || chalaux98a, 1998, 87 p
Rapport inria-00098535v1
Image document

Towards Validating a Platoon of Cristal Vehicles using CSP||B

Samuel Colin , Arnaud Lanoix , Olga Kouchnarenko , Jeanine Souquières
12th International Conference on Algebraic Methodology and Software Technology (AMAST 2008), Jul 2008, France. 6 p
Communication dans un congrès hal-00261630v1

Decidability and combination results for two notions of knowledge in security protocols.

Véronique Cortier , Stéphanie Delaune
Journal of Automated Reasoning, 2012, 48 (October), pp.441-487. ⟨10.1007/s10817-010-9208-8⟩
Article dans une revue inria-00525778v1
Image document

Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks

Stéphanie Delaune , Florent Jacquemard
Journal of Automated Reasoning, 2006, 36 (1-2), pp.85-124. ⟨10.1007/s10817-005-9017-7⟩
Article dans une revue istex inria-00578855v1
Image document

Model-based investigation of the circadian clock and cell cycle coupling in mouse embryonic fibroblasts: Prediction of RevErb-α up-regulation during mitosis

Pauline Traynard , Céline Feillet , Sylvain Soliman , Franck Delaunay , François Fages
BioSystems, 2016, 149, pp.59--69. ⟨10.1016/j.biosystems.2016.07.003⟩
Article dans une revue hal-01378466v1
Image document

Adaptation of an auto-generated code using a model-based approach to verify functional safety in real scenarios

Joelle Abou Faysal , Nour Zalmai , Ankica Barisic , Frédéric Mallet
ERTS 2022 - Embedded Real Time Systems, Jun 2022, Toulouse, France
Communication dans un congrès hal-03611183v1

Tracing SPLs precisely and efficiently

Swarup Mohalik , S. Ramesh , Jean-Vivien Millo , Shankara Narayanan Krishna , Ganesh Narwane
SPLC '12 - Proceedings of the 16th International Software Product Line Conference, Sep 2012, Salvador, Brazil. pp.186-195, ⟨10.1145/2362536.2362562⟩
Communication dans un congrès hal-00799104v1

Formal Development and Automatic Code Generation : Cardiac Pacemaker

Dominique Méry , Neeraj Kumar Singh
International Conference on Computers and Advanced Technology in Education (ICCATE, 2011), Nov 2011, Beijing, China
Communication dans un congrès inria-00638486v1
Image document

Synthesising Secure APIs

Véronique Cortier , Graham Steel
[Research Report] RR-6882, INRIA. 2009, pp.24
Rapport inria-00369395v1
Image document

Vérification formelle de protocoles basés sur de courtes chaines authentifiées

Ludovic Robin
Cryptographie et sécurité [cs.CR]. Université de Lorraine, 2018. Français. ⟨NNT : 2018LORR0019⟩
Thèse tel-01767989v1

Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers

Nora Cuppens-Bouhlahia , Frédéric Cuppens , Jean-Louis Lanet , Axel Legay , Joaquin Garcia-Alfaro
Springer, 10694, pp.269, 2018, Lecture Notes in Computer Science, Lecture Notes in Computer Science (vol. 10694), 978-3-319-76686-7
Ouvrages hal-01865019v1
Image document

Intruder deducibility constraints with negation. Decidability and application to secured service compositions

Tigran Avanesov , Yannick Chevalier , Michael Rusinowitch , Mathieu Turuani
Journal of Symbolic Computation, 2017, 80, pp.4 - 26. ⟨10.1016/j.jsc.2016.07.008⟩
Article dans une revue hal-01405851v1

Theoretical Aspects of Computing - ICTAC 2015

Martin Leucker , Camilo Rueda , Frank Valencia
Springer, 9399, 2015, Lecture Notes in Computer Science, 978-3-319-25149-3. ⟨10.1007/978-3-319-25150-9⟩
Ouvrages hal-01257171v1
Image document

Certification of a Tool Chain for Deductive Program Verification

Paolo Herms
Other [cs.OH]. Université Paris Sud - Paris XI, 2013. English. ⟨NNT : 2013PA112006⟩
Thèse tel-00789543v1
Image document

Applying a Dependency Mechanism for Voting Protocol Models Using Event-B

Paul J. Gibson , Souad Kherroubi , Dominique Méry
37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2017), Jun 2017, Neuchâtel, Switzerland. pp.124-138, ⟨10.1007/978-3-319-60225-7_9⟩
Communication dans un congrès hal-01658423v1

Fair Objects

John Paul Gibson , Dominique Méry
H. Zedan & A. Cau. Object-oriented technology and computing systems re-engineering, Horwood Publishing Ltd, 2000, Computer Science & Electronic Engineering
Chapitre d'ouvrage inria-00099324v1
Image document

Explicit modelling of physical measures: from Event-B to Java

John Paul Gibson , Dominique Méry
IMPEX 2017: 1st International Workshop on Handling IMPlicit and EXplicit knowledge in formal system development, Nov 2017, Xi’An, China. pp.64 - 79, ⟨10.4204/EPTCS.271.5⟩
Communication dans un congrès hal-01798224v1
Image document

Specification of Concretization and Symbolization Policies in Symbolic Execution

Robin David , Sébastien Bardin , Josselin Feist , Laurent Mounier , Marie-Laure Potet , et al.
ISSTA 2016 - The International Symposium on Software Testing and Analysis , Jul 2016, Saarland, Germany. pp.1-11
Communication dans un congrès hal-01721492v1

Rigorous Performance Evaluation of Self-Stabilization Using Probabilistic Model Checking

Narges Fallahi , Borzoo Bonakdarpour , Sébastien Tixeuil
International Symposium on Reliable Distributed Systems, Sep 2013, Braga, Portugal. pp.153-162, ⟨10.1109/SRDS.2013.24⟩
Communication dans un congrès hal-00930109v1
Image document

Some Formal Tools for Computer Arithmetic: Flocq and Gappa

Sylvie Boldo , Guillaume Melquiond
ARITH 2021 - 28th IEEE International Symposium on Computer Arithmetic, Jun 2021, Online, Italy
Communication dans un congrès hal-03233227v1
Image document

Incorporating Animation in Stepwise Development of Formal Specification

Atif Mashkoor , Jean-Pierre Jacquot
[Research Report] 2009, pp.10
Rapport inria-00392996v1
Image document

Compositional design of isochronous systems

Jean-Pierre Talpin , Julien Ouy , Loïc Besnard , Paul Le Guernic
[Research Report] RR-6227, INRIA. 2007, pp.24
Rapport inria-00156499v5
Image document

Formalisation et test d'IPv6

Abdelghani Benharref , Zineb Berbich , Mohamed Salah Bouassida , Rachida Dssouli , Isabelle Chrisment
[Contrat] A03-R-465 || benharref03a, 2003, 21 p
Rapport inria-00099471v1
Image document

One Vote is Enough for Analysing Privacy

Stéphanie Delaune , Joseph Lallemand , Arthur Outrey
CNRS. 2023
Rapport hal-04262499v1
Image document

Verification and validation of Machine Learning techniques

Julien Girard-Satabin
Artificial Intelligence [cs.AI]. Université Paris-Saclay, 2021. English. ⟨NNT : 2021UPASG080⟩
Thèse tel-03547545v1
Image document

Towards Formalization and Sharing of Atelier B Proofs with Dedukti

Claude Stolze , Olivier Hermant , Romain Guillaumé
2024
Pré-publication, Document de travail hal-04398119v1