Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleOpen Access

    Image-Binary Automata

  • articleNo Access

    A FORMULA-DRIVEN MODULAR ATTACK ON STATE EXPLOSION

  • articleNo Access

    Abstraction and Counterexample-Guided Refinement in Model Checking of Hybrid Systems

  • articleNo Access

    MOLECULAR MODEL CHECKING

  • articleNo Access

    SAT-BASED MODEL CHECKING FOR REGION AUTOMATA

  • articleNo Access

    CONFLICTS AND FAIR TESTING

  • articleNo Access

    EXPLOITING SYMMETRIES FOR TESTING EQUIVALENCE VERIFICATION IN THE SPI CALCULUS

  • articleNo Access

    MODULAR RANKING ABSTRACTION

  • articleNo Access

    VERIFYING VERY LARGE INDUSTRIAL CIRCUITS USING 100 PROCESSES AND BEYOND

  • articleNo Access

    SYMBOLIC IMPLEMENTATION OF ALTERNATING AUTOMATA

  • articleNo Access

    SWITCHING GRAPHS

  • articleNo Access

    COMPLETE SAT-BASED MODEL CHECKING FOR CONTEXT-FREE PROCESSES

  • articleNo Access

    FORMAL VERIFICATION OF P SYSTEMS USING SPIN

  • articleNo Access

    COMPUTABLE SEMANTICS FOR CTL* ON DISCRETE-TIME AND CONTINUOUS-SPACE DYNAMIC SYSTEMS

  • articleNo Access

    COMPOSITIONAL VERIFICATION OF THE GENERALIZED NONBLOCKING PROPERTY USING ABSTRACTION AND CANONICAL AUTOMATA

  • articleNo Access

    COMPLEXITY OF UNIVERSAL CIRCUMSCRIPTION

  • articleNo Access

    Security analysis of multi-party quantum private comparison protocol by model checking

  • articleNo Access

    Formal analysis and evaluation of the back-off procedure in IEEE802.11P VANET

  • articleNo Access

    Graph Pattern Matching: Capturing Bisimilar Subgraph

  • articleNo Access

    A DESIGN FOR VERIFICATION APPROACH USING AN EMBEDDING OF PSL IN AsmL