Author of the publication

An Axiomatic Value Model for Isabelle/UTP.

, , and . UTP, volume 10134 of Lecture Notes in Computer Science, page 155-175. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository., , and . ICECCS, page 290-298. IEEE Computer Society, (2007)A Methodology for Protocol Verification Applied to EMV® 1., , and . SBMF, volume 11254 of Lecture Notes in Computer Science, page 180-197. Springer, (2018)A formal security policy for xenon., and . FMSE, page 43-52. ACM, (2008)Taking Our Own Medicine: Applying the Refinement Calculus to State-Rich Refinement Model Checking., , and . ICFEM, volume 4260 of Lecture Notes in Computer Science, page 697-716. Springer, (2006)POSIX file store in Z/Eves: An experiment in the verified software repository., , and . Sci. Comput. Program., 74 (4): 238-257 (2009)A Chain Datatype in Z., and . Int. J. Software and Informatics, 3 (2-3): 357-374 (2009)Formal techniques in the safety analysis of software components of a new dialysis machine., , , , , , and . Sci. Comput. Program., (2019)CZT Support for Z Extensions., , , and . IFM, volume 3771 of Lecture Notes in Computer Science, page 227-245. Springer, (2005)VDM at Large: Modelling the EMV® 2^nd 2 nd Generation Kernel.. SBMF, volume 11254 of Lecture Notes in Computer Science, page 109-125. Springer, (2018)Safety Analysis of Software Components of a Dialysis Machine Using Model Checking., , , , , , and . FACS, volume 10487 of Lecture Notes in Computer Science, page 137-154. Springer, (2017)