Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 6 publications
references
References 0 publications
0
5
0
Order By: Relevance
“…Indeed, although Figure 1 is based on the equations in Figure 3, the relation is not close. Lamport [15] has convinced me that the dichotomy of imperative versus declarative sketched above is not helpful. A program in Scheme or in Prolog, though declarative, still specifies a computation and according to Lamport all computation is performed by a state machine of some sort.…”
Section: Discussionmentioning
confidence: 99%
“…Indeed, although Figure 1 is based on the equations in Figure 3, the relation is not close. Lamport [15] has convinced me that the dichotomy of imperative versus declarative sketched above is not helpful. A program in Scheme or in Prolog, though declarative, still specifies a computation and according to Lamport all computation is performed by a state machine of some sort.…”
Section: Discussionmentioning
confidence: 99%
“…First, state machine is a widely used and accepted computational model in computer science [15]. Second, our model is expected to describe change happens in a system when attacks and MTDs occur.…”
Section: Three-layer Modelmentioning
confidence: 99%
“…We use TLA+ to secure smart contract design because TLA+ uses mathematics in a simple, native way to specify state machines [12]; it facilitates the implementation of secure design patterns and automates vulnerability detection. TLA+ has demonstrated the value of formal methods for Real-world Systems.…”
Section: A Design By Contract and Tla+mentioning
confidence: 99%