Skip to Main content Skip to Navigation

Department 2: Formal methods

 For all your questions or comments about this collection, please contact us at:


Latest deposits

Chargement de la page




Number of full text documents


Submissions distribution by document type


Decision procedures XPath Operational transformation Machine Combination of decision procedures Operational Transformation Protocoles Security protocols Combination Schwilgué Intrusion detection Applied π-Calculus Logarithms Simulation Symbolic animation Vérification Social networks Protocoles cryptographiques Modelling Malware Polymorphism Validation Test generation Distributed systems Déduction automatique Online Social Networks OSN Event-B Sines Termination Implicit computational complexity Cryptographic protocols Automated verification Completeness Formal Verification Automated deduction Adding machine Formal language Animation Computability Algorithms Web services Protocol Abstract model TLA+ Reachability Semantics Proof-based development Privacy Détection d'intrusions Cryptography Formal methods Distributed algorithms Calculating machine Formal method Model checking Computable analysis Formal verification Composition Optimistic replication Behavioral detection Security Algorithmic randomness Equational theories Abstraction First-order logic Symbolic model Rewriting Unification Protocols Decision procedure Narrowing Temporal logic Réécriture SMT Méthodes formelles Decidability Tree automata Reliability Collaborative editors Random generation Model-checking Raffinement Trace Proof assistants Algorithm Theorem proving Satisfiability Modulo Theories Refinement Sécurité Tilings E-voting Constraint solving Edward Sang Complexity Secrecy Satisfiability Term rewriting Verification Formal Methods Authentication