S. Purushothaman Iyer
S. Purushothaman Iyer
ARO (Network Science) and NCSU (Compuer Science)
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
Unreliable channels are easier to verify than perfect channels
G Cécé, A Finkel, SP Iyer
Information and Computation 124 (1), 20-31, 1996
On synthesizing systolic arrays from recurrence equations with linear dependencies
SV Rajopadhye, S Purushothaman, RM Fujimoto
Foundations of Software Technology and Theoretical Computer Science: Sixth …, 1986
A formal methods approach to medical device review
R Jetley, SP Iyer, P Jones
Computer 39 (4), 61-67, 2006
Analyzing network traffic to detect self-decrypting exploit code
Q Zhang, DS Reeves, P Ning, SP Iyer
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Data flow analysis of communicating finite state machines
W Peng, S Puroshothaman
ACM Transactions on Programming Languages and Systems (TOPLAS) 13 (3), 399-442, 1991
Optimality in abstractions of model checking
R Cleaveland, P Iyer, D Yankelevich
Static Analysis: Second International Symposium, SAS'95 Glasgow, UK …, 1995
Reasoning about complementary intrusion evidence
Y Zhai, P Ning, P Iyer, DS Reeves
20th Annual Computer Security Applications Conference, 39-48, 2004
Probabilistic lossy channel systems
P Iyer, M Narasimha
Colloquium on Trees in Algebra and Programming, 667-681, 1997
Well-abstracted transition systems: Application to FIFO automata
A Finkel, SP Iyer, G Sutre
Information and Computation 181 (1), 1-31, 2003
Reasoning about probabilistic lossy channel systems
P Abdulla, C Baier, P Iyer, B Jonsson
CONCUR 2000—Concurrency Theory: 11th International Conference University …, 2000
Probabilistic temporal logics via the modal mu-calculus
R Cleaveland, SP Iyer, M Narasimha
Theoretical Computer Science 342 (2-3), 316-350, 2005
Analysis of a class of communicating finite state machines
W Peng, S Purushothaman
Acta Informatica 29 (6), 499-522, 1992
Unfoldings of unbounded Petri nets
PA Abdulla, SP Iyer, A Nylén
Computer Aided Verification: 12th International Conference, CAV 2000 …, 2000
An adequate operational semantics of sharing in lazy evaluation
S Purushothaman, J Seaman
European symposium on programming, 435-450, 1992
Probabilistic temporal logics via the modal mu-calculus
M Narasimha, R Cleaveland, P Iyer
Foundations of Software Science and Computation Structures: Second …, 1999
Reasoning about probabilistic behavior in concurrent systems
S Purushothaman, PA Subrahmanyam
IEEE transactions on software engineering, 740-745, 1987
An operational semantics of sharing in lazy evaluation
J Seaman, SP Iyer
Science of Computer Programming 27 (3), 289-322, 1996
SAT-solving the coverability problem for Petri nets
PA Abdulla, SP Iyer, A Nylén
Formal Methods in System Design 24, 25-43, 2004
Deadlock detection in communicating finite state machines by even reachability analysis
W Peng
Mobile Networks and Applications 2, 251-257, 1997
C wolf-a toolset for extracting models from c programs
DC Du Varney, S Purushothaman Iyer
Formal Techniques for Networked and Distributed Sytems—FORTE 2002: 22nd …, 2002
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20