Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
11357 Publications
2008 |
Published |
Journal Article |
IST-REx-ID: 4190
Kai M, Heisenberg C-PJ, Tada M. 2008. Sphingosine-1-phosphate receptors regulate individual cell behaviours underlying the directed migration of prechordal plate progenitor cells during zebrafish gastrulation. Development. 135(18), 3043–3051.
View
| DOI
2008 |
Published |
Conference Paper |
IST-REx-ID: 4244
Yang E, Barton NH, Arslan T, Erdogan A. 2008. A novel shifting balance theory-based approach to optimization of an energy-constrained modulation scheme for wireless sensor networks. WCCI: IEEE World Congress on Computational Intelligence, 2749–2756.
View
| DOI
2008 |
Published |
Book Chapter |
IST-REx-ID: 4371
Maler O, Nickovic D, Pnueli A. 2008.Checking Temporal Properties of Discrete, Timed and Continuous Behaviors. In: Pillars of Computer science: Essays Dedicated To Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday. LNCS, , 475–505.
View
| DOI
2008 |
Published |
Conference Paper |
IST-REx-ID: 4384 |
Guerraoui R, Henzinger TA, Jobstmann B, Singh V. 2008. Model checking transactional memories. PLDI: Programming Languages Design and Implementation, 372–382.
View
| Files available
| DOI
| Download (ext.)
2008 |
Published |
Conference Paper |
IST-REx-ID: 4386
Guerraoui R, Henzinger TA, Singh V. 2008. Permissiveness in transactional memories. DISC: Distributed Computing, LNCS, vol. 5218, 305–319.
View
| DOI
| Download (ext.)
2008 |
Published |
Conference Paper |
IST-REx-ID: 4387
Guerraoui R, Henzinger TA, Singh V. 2008. Completeness and nondeterminism in model checking transactional memories. CONCUR: Concurrency Theory, LNCS, vol. 5201, 21–35.
View
| DOI
| Download (ext.)
2008 |
Published |
Conference Paper |
IST-REx-ID: 4397
Beyer D, Zufferey D, Majumdar R. 2008. CSIsat: Interpolation for LA+EUF. CAV: Computer Aided Verification, LNCS 5123, , 304–308.
View
2008 |
Published |
Conference Paper |
IST-REx-ID: 4400 |
Aviv A, Cerny P, Clark S, Cronin E, Shah G, Sherr M, Blaze M. 2008. Security evaluation of ES&S voting machines and election management system. 17th USENIX Security Symposium. USENIX: Security Symposium.
View
| Download None (ext.)
2008 |
Published |
Thesis | PhD |
IST-REx-ID: 4409 |
Prabhu V. 2008. Games for the verification of timed systems. University of California, Berkeley.
View
| Download None (ext.)
2008 |
Published |
Thesis | PhD |
IST-REx-ID: 4415
Matic S. 2008. Compositionality in deterministic real-time embedded systems. University of California, Berkeley.
View
2008 |
Published |
Conference Paper |
IST-REx-ID: 4452
Henzinger TA, Hottelier T, Kovács L. 2008. Valigator: A verification tool with bound and invariant generation. LPAR: Logic for Programming, Artificial Intelligence, and Reasoning, LNCS, vol. 5330, 333–342.
View
| DOI
| Download (ext.)
2008 |
Published |
Journal Article |
IST-REx-ID: 4509
Henzinger TA. 2008. Two challenges in embedded systems design: Predictability and robustness. Philosophical Transactions of the Royal Society A Mathematical Physical and Engineering Sciences. 366(1881), 3727–3736.
View
| DOI
| Download (ext.)
2008 |
Published |
Conference Paper |
IST-REx-ID: 4521
Gupta A, Henzinger TA, Majumdar R, Rybalchenko A, Xu R. 2008. Proving non-termination. POPL: Principles of Programming Languages, 147–158.
View
| DOI
| Download (ext.)
2008 |
Published |
Thesis |
IST-REx-ID: 4524
Ghosal A. 2008. A hierarchical coordination language for reliable real-time tasks. University of California, Berkeley.
View
2008 |
Published |
Conference Paper |
IST-REx-ID: 4527
Fisher J, Henzinger TA, Mateescu M, Piterman N. 2008. Bounded asynchrony: Concurrency for modeling cell-cell interactions. FMSB: Formal Methods in Systems Biology, LNCS, vol. 5054, 17–32.
View
| DOI
| Download (ext.)