default search action
Victoria Coleman
Person information
- affiliation: Potomac Institute for Policy Studies, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j14]Victoria Coleman:
Embodied Molecular Computation: Potential and Challenges. Computer 49(9): 43-51 (2016)
2000 – 2009
- 2004
- [j13]Mark Greaves, Victoria Stavridou-Coleman, Robert Laddaga:
Guest Editors' Introduction: Dependable Agent Systems. IEEE Intell. Syst. 19(5): 20-23 (2004) - [c15]Charles Howell, Sofia Guerra, Shari Lawrence Pfleeger, Victoria Stavridou-Coleman:
Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities. DSN 2004: 903 - 2003
- [c14]Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe:
Dependable Intrusion Tolerance: Technology Demo. DISCEX (2) 2003: 128-130 - [c13]Hassen Saïdi, Victoria Stavridou, Bruno Dutertre:
Protocol Codesign. Security Protocols Workshop 2003: 106-113 - [c12]Victoria Stavridou:
Protocol Codesign (Discussion). Security Protocols Workshop 2003: 114-118 - 2002
- [c11]Bruno Dutertre, Valentin Crettaz, Victoria Stavridou:
Intrusion-Tolerant Enclaves. S&P 2002: 216-224 - [c10]Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe:
An Architecture for an Adaptive Intrusion-Tolerant Server. Security Protocols Workshop 2002: 158-178 - 2001
- [c9]Bruno Dutertre, Hassen Saïdi, Victoria Stavridou:
Intrusion-Tolerant Group Management in Enclaves. DSN 2001: 203-214 - 2000
- [j12]Victoria Stavridou:
Architectural analysis of component-based systems. ACM SIGSOFT Softw. Eng. Notes 25(1): 96-97 (2000) - [c8]Victoria Stavridou:
Dependability Then and Now: Commentary on Donald MacKenzie, "A View from the Sonnenbichl". ICHC 2000: 127-133
1990 – 1999
- 1999
- [c7]John Herbert, Bruno Dutertre, Robert A. Riemenschneider, Victoria Stavridou:
A Formalization of Software Architecture. World Congress on Formal Methods 1999: 116-133 - [c6]Fred Gilham, Robert A. Riemenschneider, Victoria Stavridou:
Secure Interoperation of Secure Distributed Databases. World Congress on Formal Methods 1999: 701-717 - 1998
- [j11]Paul Mukherjee, Victoria Stavridou:
Decomposition in Real-Time Safety-Critical Systems. Real Time Syst. 14(2): 183-202 (1998) - [j10]Kirsten Mark Hansen, Anders P. Ravn, Victoria Stavridou:
From Safety Analysis to Software Requirements. IEEE Trans. Software Eng. 24(7): 573-584 (1998) - [c5]Victoria Stavridou, Robert A. Riemenschneider:
Provably dependable software architectures. ISAW@FSE 1998: 133-136 - 1997
- [j9]Bruno Dutertre, Victoria Stavridou:
Formal Requirements Analysis of an Avionics Control System. IEEE Trans. Software Eng. 23(5): 267-278 (1997) - 1995
- [j8]Paul Mukherjee, Victoria Stavridou:
A Theory pf Orwellian Specifications with NewThink. Formal Aspects Comput. 7(6): 704-727 (1995) - [j7]Shaoying Liu, Victoria Stavridou, Bruno Dutertre:
The practice of formal methods in safety-critical systems. J. Syst. Softw. 28(1): 77-87 (1995) - 1994
- [j6]Victoria Stavridou:
Formal Methods and VLSI Engineering Practice. Comput. J. 37(2): 96-113 (1994) - [j5]Victoria Stavridou:
Gordon's Computer: A Hardware Verification Case Study in OBJ3. Formal Methods Syst. Des. 4(3): 265-310 (1994) - 1993
- [b1]Victoria Stavridou:
Formal methods in circuit design. Cambridge tracts in theoretical computer science 37, Cambridge University Press 1993, ISBN 978-0-521-44336-4, pp. I-XIII, 1-193 - [j4]Paul Mukherjee, Victoria Stavridou:
The Formal Specification of Safety Requirements for Storing Explosives. Formal Aspects Comput. 5(4): 299-336 (1993) - [j3]Jonathan P. Bowen, Victoria Stavridou:
Safety-critical systems, formal methods and standards. Softw. Eng. J. 8(4): 189-209 (1993) - [c4]Jonathan P. Bowen, Victoria Stavridou:
The Industrial Take-up of Formal Methods in Safety-Critical and Other Areas: A Perspective. FME 1993: 183-195 - 1992
- [c3]Paul Mukherjee, Victoria Stavridou:
Newthink - An Orwellian specification language for real-time safety critical systems. RTS 1992: 128-133 - [c2]Victoria Stavridou, Joseph A. Goguen, Andrew Stevens, Steven M. Eker, Serge N. Aloneftis, Keith Michael Hobley:
FUNNEL and 2OBJ: Towards an Integrated Hardware Design Environment. TPCD 1992: 197-223 - [e1]Victoria Stavridou, Thomas F. Melham, Raymond T. Boute:
Theorem Provers in Circuit Design, Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design: Theory, Practice and Experience, Nijmegen, The Netherlands, 22-24 June 1992, Proceedings. IFIP Transactions A-10, North-Holland 1992, ISBN 0-444-89686-4 [contents]
1980 – 1989
- 1989
- [j2]Robin M. Gallimore, Derek Coleman, Victoria Stavridou:
UMIST OBJ: A Language for Executable Program Specifications. Comput. J. 32(5): 413-421 (1989) - 1988
- [c1]Victoria Stavridou, Howard Barringer, David A. Edwards:
Formal Specification and Verification of Hardware: A Comparative Case Study. DAC 1988: 197-204 - 1987
- [j1]Derek Coleman, Robin M. Gallimore, Victoria Stavridou:
The design of a rewrite rule interpreter from algebraic specifications. Softw. Eng. J. 2(4) (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint