Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
223 Publications
2008 | Published | Journal Article | IST-REx-ID: 4190
Kai M, Heisenberg C-PJ, Tada M. 2008. Sphingosine-1-phosphate receptors regulate individual cell behaviours underlying the directed migration of prechordal plate progenitor cells during zebrafish gastrulation. Development. 135(18), 3043–3051.
View
| DOI
2008 | Published | Conference Paper | IST-REx-ID: 4244
Yang E, Barton NH, Arslan T, Erdogan A. 2008. A novel shifting balance theory-based approach to optimization of an energy-constrained modulation scheme for wireless sensor networks. WCCI: IEEE World Congress on Computational Intelligence, 2749–2756.
View
| DOI
2008 | Published | Book Chapter | IST-REx-ID: 4371
Maler O, Nickovic D, Pnueli A. 2008.Checking Temporal Properties of Discrete, Timed and Continuous Behaviors. In: Pillars of Computer science: Essays Dedicated To Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday. LNCS, , 475–505.
View
| DOI
2008 | Published | Conference Paper | IST-REx-ID: 4384 |
Guerraoui R, Henzinger TA, Jobstmann B, Singh V. 2008. Model checking transactional memories. PLDI: Programming Languages Design and Implementation, 372–382.
View
| Files available
| DOI
| Download (ext.)
2008 | Published | Conference Paper | IST-REx-ID: 4386
Guerraoui R, Henzinger TA, Singh V. 2008. Permissiveness in transactional memories. DISC: Distributed Computing, LNCS, vol. 5218, 305–319.
View
| DOI
| Download (ext.)
2008 | Published | Conference Paper | IST-REx-ID: 4387
Guerraoui R, Henzinger TA, Singh V. 2008. Completeness and nondeterminism in model checking transactional memories. CONCUR: Concurrency Theory, LNCS, vol. 5201, 21–35.
View
| DOI
| Download (ext.)
2008 | Published | Conference Paper | IST-REx-ID: 4397
Beyer D, Zufferey D, Majumdar R. 2008. CSIsat: Interpolation for LA+EUF. CAV: Computer Aided Verification, LNCS 5123, , 304–308.
View
2008 | Published | Conference Paper | IST-REx-ID: 4400
Aviv A, Cerny P, Clark S, Cronin E, Shah G, Sherr M, Blaze M. 2008. Security Evaluation of ES&S Voting Machines and Election Management System. Usenix/ Accurate Electronic Voting Technology Workshop (EVT) 08.
View
| DOI
| Download (ext.)
2008 | Published | Thesis | IST-REx-ID: 4409 |
Prabhu V. 2008. Games for the verification of timed systems. University of California, Berkeley.
View
| Download None (ext.)
2008 | Published | Thesis | IST-REx-ID: 4415
Matic S. 2008. Compositionality in deterministic real-time embedded systems. University of California, Berkeley.
View
2008 | Published | Conference Paper | IST-REx-ID: 4452
Henzinger TA, Hottelier T, Kovács L. 2008. Valigator: A verification tool with bound and invariant generation. LPAR: Logic for Programming, Artificial Intelligence, and Reasoning, LNCS, vol. 5330, 333–342.
View
| DOI
| Download (ext.)