Author of the publication

Using Machine Descriptions in Program Verification.

, , and . Jerusalem Conference on Information Technology, page 515-522. (1978)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mathematical Analysis of Merge-Sorting Techniques.. IFIP Congress, page 62-66. North-Holland, (1962)Modeling of a Bubble-Memory Organization with Self-Checking Translators to Achieve High Reliability., , , , and . IEEE Trans. Computers, 22 (3): 269-275 (1973)Signature Testing with Guaranteed Bounds for Fault Coverage.. ITC, page 75-82. IEEE Computer Society, (1982)Fault-Tolerant Computing: An Introduction and a Viewpoint.. IEEE Trans. Computers, 22 (3): 225-229 (1973)Symbolic simulation for correct machine design., , and . DAC, page 280-286. ACM, (1979)Microprogram verification considered necessary., , and . AFIPS National Computer Conference, volume 47 of AFIPS Conference Proceedings, page 657-664. AFIPS Press, (1978)Implementation of an Experimental Fault-Tolerant Memory System., and . IEEE Trans. Computers, 25 (6): 557-568 (1976)A Survey of Fault Tolerant Computer Architecture and its Evaluation., and . IEEE Computer, 4 (1): 9-16 (1971)Book reviews., , , , , , , and . Computers and the Humanities, 16 (4): 245-259 (1982)Automated proofs of microprogram correctness., , and . MICRO, page 51-55. ACM, (1976)