IBM / EMC / W. W. Norton & Co. / Hybrid Systems / Princeton University Press / Universal Computer / RTL / Intel / Microsoft / /
Country
France / United States / /
Currency
pence / /
Event
Man-Made Disaster / Product Release / /
IndustryTerm
software design / software industries / realtime systems / abstract systems / state-transition systems / finite state concurrent systems / medical devices / automotive electronics / automated search / much larger systems / verification algorithms / search procedure / heterogeneous systems / wireless sensor network / software device drivers / finite state systems / software poses significant problems / control-intensive reactive systems / low-level parallel composition operator / transition systems / monolithic verification tools / verification technology / software verification / model checking tools / energy / large systems / explicit-state algorithms / hardware verification applications / real software / software / account hardware / concurrent software / application software / industrial-strength systems / important applications / intelligent exhaustive search / conventional and symbolic model checking algorithms / program proof systems / electronics industry / asynchronous systems / concurrent systems / infinite state systems / communication protocols / finite-state concurrent systems / non-trivial systems / proof systems / mixed software/hardware systems / process-control systems / real-time embedded systems / security algorithms / philosophers solution / larger systems / /
Organization
MIT / Princeton University / Carnegie Mellon / /
Person
P. Quielle / E. Allen Emerson / Edmund M. Clarke / A. P. Sistla / V / Joseph Sifakis / Joseph Sifakis Model Checking / Michael C. Browne / Edmund Clarke / Allen Emerson / /
Position
editor / Symbolic Model / Interpolation and SAT-based Model / unified lattice model for static analysis / /
Product
Model Checking / /
ProgrammingLanguage
Java / /
ProvinceOrState
Massachusetts / /
PublishedMedium
Theoretical Computer Science / Complex Systems / Lecture Notes in Computer Science / /
Technology
verification algorithms / Model Checking algorithm / explicit-state algorithms / conventional and symbolic model checking algorithms / operating systems / key enabling technology / Model Checking algorithms / CTL Model Checking algorithm / Java / CAV / security algorithms / Simulation / communication protocols / verification technology / same algorithm / /