Verified Software: Theories, Tools, Experiments Third International Conference, VSTTE 2010, Edinburgh, UK, August 16-19, 2010. Proceedings /
This volume contains the proceedings of the third working conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2010, held in Edinburgh, UK, in August 2010. The 11 papers presented together with 3 invited talks were carefully revised and selected for inclusion in the book. This th...
Corporate Author: | SpringerLink (Online service) |
---|---|
Other Authors: | Leavens, Gary T. (Editor), OHearn, Peter. (Editor), Rajamani, Sriram K. (Editor) |
Format: | Electronic |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Series: | Lecture Notes in Computer Science,
6217 |
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-15057-9 |
Similar Items
-
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware /
by: Monnappa K A,
Published: (2018) -
Software Tools for the Simulation of Electrical Systems : Theory and Practice /
by: Kumar, L. Ashok,, et al.
Published: (2020) -
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware /
by: Mohanta, Abhijit,, et al.
Published: (2020) -
Game design workshop : a playcentric approach to creating innovative games /
by: Fullerton, Tracy,
Published: (2019) -
Computer and communication engineering : first International Conference, ICCCE 2018, Guayaquil, Ecuador, October 25-27, 2018, proceedings /
Published: (2019)