Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM 2013
DOI: 10.1145/2486001.2491711
|View full text |Cite
|
Sign up to set email alerts
|

A (not) NICE way to verify the openflow switch specification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Software verification provides the highest degree of software assurance, with its strengths residing in the mathematical concepts that can be leveraged to prove correctness with respect to specific properties. Most notably, bounded verification techniques, such as Alloy [28], have recently received a great deal of attention in the software engineering community (e.g., [8,9,11,13,14,16,20,26,34,35,38,43,46,48,52,54,55,61,63,66]), due to the strength of their automated, yet formally precise, analysis capabilities. The basic idea behind these techniques is to construct a formula that encodes the behavior of a system and examine it up to a user-specified bound.…”
Section: Introductionmentioning
confidence: 99%
“…Software verification provides the highest degree of software assurance, with its strengths residing in the mathematical concepts that can be leveraged to prove correctness with respect to specific properties. Most notably, bounded verification techniques, such as Alloy [28], have recently received a great deal of attention in the software engineering community (e.g., [8,9,11,13,14,16,20,26,34,35,38,43,46,48,52,54,55,61,63,66]), due to the strength of their automated, yet formally precise, analysis capabilities. The basic idea behind these techniques is to construct a formula that encodes the behavior of a system and examine it up to a user-specified bound.…”
Section: Introductionmentioning
confidence: 99%