Skip to Main content Skip to Navigation

Department 2: Formal methods

 For all your questions or comments about this collection, please contact us at:


Latest deposits

Chargement de la page




Number of full text documents


Submissions distribution by document type


Decision procedures Animation Composition Détection d'intrusions Satisfiability Authentication Web services Operational Transformation Collaborative editors Réécriture Satisfiability Modulo Theories Privacy Rewriting Verification Protocol Modelling Reliability Symbolic animation Formal Methods Behavioral detection Reachability Equational theories Combination of decision procedures Computable analysis Term rewriting Unification Distributed systems Protocoles Social networks Algorithm Formal methods Sécurité Security Abstraction Distributed algorithms Online Social Networks OSN Vérification Narrowing Implicit computational complexity Machine Malware Completeness Applied π-Calculus Abstract model Symbolic model Formal verification Intrusion detection Computability Logarithms Operational transformation Méthodes formelles XPath Sines Formal language Optimistic replication Formal Verification Proof-based development Protocols First-order logic Calculating machine Constraint solving Edward Sang Tree automata Cryptographic protocols Validation Adding machine TLA+ Automated verification Complexity Raffinement Cryptography Random generation Secrecy Proof assistants Formal method Semantics Model checking SMT Refinement Security protocols Test generation Trace Temporal logic Decidability Algorithmic randomness E-voting Tilings Model-checking Termination Polymorphism Protocoles cryptographiques Automated deduction Event-B Déduction automatique Simulation Algorithms Decision procedure Theorem proving Combination Schwilgué