David L. Dill
#35,430
Most Influential Person Now
Computer scientist
David L. Dill's AcademicInfluence.com Rankings
David L. Dillcomputer-science Degrees
Computer Science
#1861
World Rank
#1934
Historical Rank
Database
#856
World Rank
#898
Historical Rank
Download Badge
Computer Science
David L. Dill's Degrees
- Bachelors Mathematics California Institute of Technology
Similar Degrees You Can Earn
Why Is David L. Dill Influential?
(Suggest an Edit or Addition)According to Wikipedia, David Lansing Dill is a computer scientist and academic noted for contributions to formal verification, electronic voting security, and computational systems biology. In 2013, Dill was elected as a member into the National Academy of Engineering for the development of techniques to verify hardware, software, and electronic voting systems.
David L. Dill's Published Works
Published Works
- A Theory of Timed Automata (1994) (7306)
- Symbolic Model Checking: 10^20 States and Beyond (1990) (3253)
- Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks (2017) (1424)
- Automata For Modeling Real-Time Systems (1990) (1107)
- Model-Checking in Dense Real-time (1993) (1027)
- EXE: Automatically Generating Inputs of Death (2008) (1015)
- Timing Assumptions and Verification of Finite-State Concurrent Systems (1989) (845)
- A Decision Procedure for Bit-Vectors and Arrays (2007) (653)
- Symbolic model checking for sequential circuit verification (1993) (597)
- Better verification through symmetry (1996) (596)
- Automatic verification of Pipelined Microprocessor Control (1994) (587)
- Trace theory for automatic hierarchical verification of speed-independent circuits (1989) (586)
- Protocol verification as a hardware design aid (1992) (551)
- Sequential circuit verification using symbolic model checking (1990) (483)
- Model-checking for real-time systems (1990) (470)
- CMC: a pragmatic approach to model checking real code (2002) (448)
- Automated identification of stratifying signatures in cellular subpopulations (2014) (391)
- Learning a SAT Solver from Single-Bit Supervision (2018) (316)
- The Murphi Verification System (1996) (301)
- The Marabou Framework for Verification and Analysis of Deep Neural Networks (2019) (297)
- Automatic Veriication of Nite-state Concurrent Systems Using Temporal-logic Speciications. Acm (1993) (295)
- Ly6d marks the earliest stage of B-cell specification and identifies the branchpoint between B-cell and T-cell development. (2009) (290)
- Experience with Predicate Abstraction (1999) (279)
- CVC: A Cooperating Validity Checker (2002) (243)
- Automatic Verification of Sequential Circuits Using Temporal Logic (1986) (226)
- Gene Expression Commons: An Open Platform for Absolute Gene Expression Profiling (2012) (223)
- Validity Checking for Combinations of Theories with Equality (1996) (221)
- The Theory of Timed Automata (1991) (206)
- EXE: automatically generating inputs of death (2006) (202)
- Minimization of Timed Transition Systems (1992) (186)
- Validation with guided search of the state space (1998) (184)
- Parallelizing the Murϕ Verifier (2001) (179)
- Parallelizing the Murphi Verifier (1997) (178)
- Architecture validation for processors (1995) (171)
- Checking Satisfiability of First-Order Formulas by Incremental Translation to SAT (2002) (168)
- Symbolic Model Checking : IO * ’ States and Beyond * (1992) (167)
- A decision procedure for an extensional theory of arrays (2001) (165)
- MYC through miR-17-92 suppresses specific target genes to maintain survival, autonomous proliferation, and a neoplastic state. (2014) (162)
- An Invitation to Formal Methods (1996) (161)
- Efficient self-timing with level-encoded 2-phase dual-rail (LEDR) (1991) (161)
- Exact two-level minimization of hazard-free logic with multiple-input changes (1992) (141)
- Algorithms for interface timing verification (1992) (134)
- Extracting binary signals from microarray time-course data (2007) (133)
- Successive approximation of abstract transition relations (2001) (124)
- Boolean implication networks derived from large scale, whole genome microarray datasets (2008) (120)
- A decision procedure for bit-vector arithmetic (1998) (120)
- An implementation of three algorithms for timing verification based on automata emptiness (1992) (118)
- Verifying Systems with Replicated Components in Murphi (1996) (116)
- Improved probabilistic verification by hash compaction (1995) (116)
- Counter-Example Based Predicate Discovery in Predicate Abstraction (2002) (115)
- Automatic verification of asynchronous circuits using temporal logic (1986) (115)
- Model-Checking for Probabilistic Real-Time Systems (Extended Abstract) (1991) (112)
- Synthesis of asynchronous state machines using a local clock (1991) (111)
- Verifying Systems with Replicated Components in Murϕ (1999) (109)
- Towards Proving the Adversarial Robustness of Deep Neural Networks (2017) (106)
- Automatic synthesis of locally-clocked asynchronous state machines (1991) (100)
- The Global Regulatory Architecture of Transcription during the Caulobacter Cell Cycle (2015) (100)
- Checking for Language Inclusion Using Simulation Preorders (1991) (100)
- Genomic and proteomic analysis reveals a threshold level of MYC required for tumor maintenance. (2008) (99)
- Monitor-Based Formal Specification of PCI (2000) (98)
- Provably Minimally-Distorted Adversarial Examples (2017) (98)
- Automatic synthesis of extended burst-mode circuits. I.(Specification and hazard-free implementations) (1999) (98)
- Self-timed logic using Current-Sensing Completion Detection (CSCD) (1991) (96)
- Java model checking (2000) (94)
- Synthesis of 3D asynchronous state machines (1992) (92)
- Using Magnatic Disk Instead of Main Memory in the Murphi Verifier (1998) (91)
- Synthesis of Asynchronous Controllers for Heterogeneous Systems (1994) (90)
- Automatic verification of the SCI cache coherence protocol (1995) (88)
- Verification of Real-Time Systems by Successive Over and Under Approximation (1995) (86)
- Combined Analysis of Murine and Human Microarrays and ChIP Analysis Reveals Genes Associated with the Ability of MYC To Maintain Tumorigenesis (2008) (86)
- Verification of FLASH cache coherence protocol by aggregation of distributed transactions (1996) (85)
- Efficient validity checking for processor verification (1995) (80)
- Synthesizing Processes and Schedulers from Temporal Specifications (1990) (79)
- Automatic synthesis of 3D asynchronous state machines (1992) (77)
- EXE: A system for automatically generating inputs of death using symbolic execution (2006) (76)
- Reducing BDD Size by Exploiting Functional Dependencies (1993) (76)
- Ground-Truth Adversarial Examples (2017) (76)
- Deriving a simulation input generator and a coverage metric from a formal specification (2002) (75)
- Formal specification of abstract memory models (1993) (75)
- The Role of Interleukin-1 in Wound Biology. Part II: In Vivo and Human Translational Studies (2010) (75)
- An executable specification, analyzer and verifier for RMO (relaxed memory order) (1995) (74)
- Formal Verification of Out-of-Order Execution Using Incremental Flushing (1998) (72)
- Practical asynchronous controller design (1992) (71)
- Automatic Synthesis of Extended Burst-Mode Circuits : Part II ( Automatic Synthesis ) (1996) (71)
- Verifying Automata Specifications of Probabilistic Real-time Systems (1991) (70)
- A New Scheme for Memory-Efficient Probabilistic Verification (1996) (68)
- Systematic discovery of mutation-specific synthetic lethals by mining pan-cancer human primary tumor data (2017) (66)
- The Libra Blockchain (2019) (61)
- A Generalization of Shostak's Method for Combining Decision Procedures (2002) (61)
- New Techniques for Efficient Verification with Implicitly Conjoined BDDs (1994) (60)
- Efficient verification of symmetric concurrent systems (1993) (59)
- CMC: a pragmatic approach to model checking real code (2002) (58)
- Architecture and inherent robustness of a bacterial cell-cycle control system (2008) (57)
- Automatic Technology Mapping for Generalized Fundamental-Mode Asynchronous Designs (1993) (56)
- Towards program optimization through automated analysis of numerical precision (2010) (55)
- Voting and technology: who gets to count your vote? (2003) (55)
- The design of a high-performance cache controller: a case study in asynchronous synthesis (1993) (55)
- Approximate reachability with BDDs using overlapping projections (1998) (55)
- MiDReG: A method of mining developmentally regulated genes using Boolean implications (2010) (53)
- An Executable Specification and Verifier for Relaxed Memory Order (1999) (52)
- A simple method for extracting models from protocol code (2001) (51)
- Developing Bug-Free Machine Learning Systems With Formal Mathematics (2017) (51)
- Temporal changes in gene expression induced by sulforaphane in human prostate cancer cells (2009) (51)
- Deciding Presburger Arithmetic by Model Checking and Comparisons with Other Methods (2002) (48)
- Automatic synthesis of extended burst-mode circuits. II. (Automaticsynthesis) (1999) (45)
- The m6A RNA demethylase FTO is a HIF-independent synthetic lethal partner with the VHL tumor suppressor (2020) (44)
- Mutant WT1 is associated with DNA hypermethylation of PRC2 targets in AML and responds to EZH2 inhibition. (2015) (44)
- Reducing Manual Abstraction in Formal Verification of Out-of-Order Execution (1998) (43)
- Higher-Level Specification and Verification with BDDs (1992) (43)
- Using magnetic disk instead of main memory in the mur φ verifier (1998) (41)
- Efficient Verification with BDDs using Implicitly Conjoined Invariants (1993) (41)
- Counterexample-guided choice of projections in approximate symbolic model checking (2000) (39)
- Event Correlation: Language and Semantics (2003) (38)
- Specification and automatic verification of self-timed queues (1989) (38)
- A Framework for Cooperating Decision Procedures (2000) (38)
- Verification by approximate forward and backward reachability (1998) (37)
- Symbolic model checking: 10/sup 20/ states and beyond (1990) (37)
- Unifying synchronous/asynchronous state machine synthesis (1993) (37)
- State reduction using reversible rules (1996) (37)
- The Role of Dice in Election Audits – Extended Abstract (2006) (36)
- The Role of Interleukin-1 in Wound Biology. Part I: Murine In Silico and In Vitro Experimental Analysis (2010) (36)
- An Incremental Heap Canonicalization Algorithm (2005) (34)
- An Online Proof-Producing Decision Procedure for Mixed-Integer Linear Arithmetic (2003) (34)
- Multiple Representations of Biological Processes (2006) (34)
- A high-performance asynchronous SCSI controller (1995) (33)
- Faster Proof Checking in the Edinburgh Logical Framework (2002) (33)
- Timing analysis of asynchronous systems using time separation of events (1999) (33)
- Protocol Verification by Aggregation of Distributed Transactions (1996) (32)
- Decision procedures for bit-vectors, arrays and integers (2007) (32)
- Verification of Cache Coherence Protocols by Aggregation of Distributed Transactions (1998) (31)
- Acceptance of Formal Methods : Lessons from Hardware Design (1996) (31)
- A Practical Approach to Partial Functions in CVC Lite (2005) (30)
- Automatic Generation of Invariants in Processor Verification (1996) (29)
- Modeling hierarchical combinational circuits (1993) (29)
- Liquid chromatography/mass spectrometry methods for measuring dipeptide abundance in non-small-cell lung cancer. (2013) (29)
- Combining State Space Caching and Hash Compaction (1996) (28)
- Automatic Formal Verification of Block Cipher Implementations (2008) (28)
- The Pathway Logic Assistant (2005) (28)
- Approximations for verifying timing properties (1994) (27)
- Next-Generation Computational Genetic Analysis: Multiple Complement Alleles Control Survival after Candida albicans Infection (2011) (26)
- Ly 6 d marks the earliest stage of B-cell specification and identifies the branchpoint between B-cell and T-cell development (2009) (26)
- Symbolic Simulation with Approximate Values (2000) (25)
- Timing Robustness in the Budding and Fission Yeast Cell Cycles (2010) (25)
- What's between simulation and formal verification? (extended abstract) (1998) (25)
- Self-Consistency Checking (1996) (25)
- A decision procedure for fixed-width bit-vectors (2005) (24)
- Reluplex: a calculus for reasoning about deep neural networks (2021) (24)
- A Specification Methodology by a Collection of Compact Properties as Applied to the Intel® ItaniumTM Processor Bus Protocol (2001) (24)
- Cell cycle progression in Caulobacter requires a nucleoid-associated protein with high AT sequence recognition (2016) (24)
- Timing analysis for extended burst-mode circuits (1997) (23)
- CauloBrowser: A systems biology resource for Caulobacter crescentus (2015) (23)
- A Partitioning Methodology for BDD-Based Verification (2004) (23)
- Predicate Abstraction (2003) (23)
- The Pathalyzer: A Tool for Analysis of Signal Transduction Pathways (2005) (22)
- Practical generalizations of asynchronous state machines (1993) (21)
- Cd14 SNPs regulate the innate immune response. (2012) (21)
- Approximate algorithms for time separation of events (1997) (20)
- Applying a Reusable Election Threat Model at the County Level (2011) (19)
- Reliable verification using symbolic simulation with scalar values (2000) (19)
- Evaluation of voting systems (2004) (19)
- The Role of Abcb5 Alleles in Susceptibility to Haloperidol-Induced Toxicity in Mice and Humans (2015) (18)
- The multiple PDZ domain protein Mpdz/MUPP1 regulates opioid tolerance and opioid-induced hyperalgesia (2016) (18)
- Verifying linear temporal properties of data insensitive controllers using finite instantiations (1997) (18)
- A better prognosis for genetic association studies in mice. (2012) (18)
- Practicality of state-machine verification of speed-independent circuits (1989) (17)
- Applications of symbolic simulation to the formal verification of microprocessors (1999) (17)
- Formal Verification of Out-of-Order Execution with Incremental Flushing (2002) (16)
- Checking properties of safety critical specifications using efficient decision procedures (1998) (16)
- More accurate polynomial-time min-max timing simulation (1997) (15)
- The Move Prover (2020) (15)
- Verification with Real-Time COSPAN (1992) (15)
- Proceedings of the 6th International Conference on Computer Aided Verification (1994) (15)
- Polynomial-time techniques for approximate timing analysis of asynchronous systems (1998) (14)
- Mining TCGA Data Using Boolean Implications (2014) (12)
- Using Formal Specifications for Functional Validation of Hardware Designs (2002) (12)
- Improved approximate reachability using auxiliary state variables (1999) (12)
- Static Analysis to Identify Invariants in RSML Specifications (1998) (12)
- Automatic verification of speed-independent circuits with Petri net specifications (1989) (11)
- Writing, verifying, and exploiting formal specifications for hardware designs (2002) (11)
- Point/counterpointThe U.S. should ban paperless electronic voting machines (2008) (11)
- Multi-threaded reachability (2005) (11)
- STONES UNTURNED: GAPS IN THE INVESTIGATION OF SARASOTA'S DISPUTED CONGRESSIONAL ELECTION (2007) (11)
- Computer assisted analysis of multiprocessor memory systems (1996) (10)
- Factors Associated with the Excessive CD-13 Undervote in the 2006 General Election in Sarasota County, Florida (2007) (10)
- Gene Expression Changes Induced by Genistein in the Prostate CancerCell Line LNCaP (2010) (10)
- Automatic checking of aggregation abstractions through stateenumeration (1997) (10)
- Mebendazole for Differentiation Therapy of Acute Myeloid Leukemia Identified by a Lineage Maturation Index (2019) (10)
- Identification of drug targets by chemogenomic and metabolomic profiling in yeast (2012) (10)
- Approximate Symbolic Model Checking using Overlapping Projections (1999) (10)
- Resources: A Safe Language Abstraction for Money (2020) (10)
- Model checking system software with CMC (2002) (9)
- Practical timing analysis of asynchronous circuits using time separation of events (1998) (9)
- Higher-level Speciication and Veriication with Bdds (1993) (9)
- Efficient algorithms for approximate time separation of events (2002) (9)
- Gene Expression Changes Induced by Genistein in the Prostate Cancer Cell Line LNCaP (2010) (8)
- Formal verification meets simulation (embedded tutorial) (abstract only) (1999) (8)
- Performance-driven Synthesis Of Asynchronous Controllers (1994) (8)
- Parallelizing the Mur' Veriier (1997) (8)
- Formal verification of cache systems using refinement relations (1990) (8)
- Aquila enables reference-assisted diploid personal genome assembly and comprehensive variant detection based on linked reads (2021) (7)
- Producing Proofs from an Arithmetic Decision Procedure in Elliptical LF (2002) (7)
- A Pharmacogenetic Discovery: Cystamine Protects Against Haloperidol-Induced Toxicity and Ischemic Brain Injury (2016) (6)
- Prioritized model checking (1998) (6)
- High Throughput Computational Mouse Genetic Analysis (2020) (6)
- Guest Editors' Introduction: E-Voting Security (2004) (6)
- Higher-Level Speci cation and Veri cationWith BDDs ? (1992) (6)
- ELECTRONIC VOTING : AN OVERVIEW OF THE PROBLEM (2005) (6)
- A geographically-diverse collection of 418 human gut microbiome pathway genome databases (2017) (6)
- Model checking Java programs (2000) (5)
- BDD-based synthesis of extended burst-mode controllers (1998) (5)
- Aquila_stLFR: diploid genome assembly based structural variant calling package for stLFR linked-reads (2019) (5)
- Formally Verifying Data and Control with Weak Reachability Invariants (1998) (5)
- Strengthening Invariants by Symbolic Consistency Testing (2003) (4)
- Aquila: diploid personal genome assembly and comprehensive variant detection based on linked reads (2019) (4)
- Better Verification Through Symmetry11This research was supported by the “Multi-Module Systems” thrust of the Stanford Center for Integrated Systems. Sun Microsystems provided the computers. (1993) (4)
- Predictive Reachability Using a Sample-Based Approach (2005) (4)
- Industrial Practice (1996) (4)
- Approximate Time Separation of Events in Practice (1997) (4)
- Using Interface Refinement to Integrate Formal Verification into the Design Cycle (2004) (3)
- Complete Trace Structures (1989) (3)
- Move: A LanguageWith Programmable Resources (2019) (2)
- The Role of Abcb 5 Alleles in Susceptibility to Haloperidol-Induced Toxicity in Mice and Humans (2015) (2)
- A New Scheme for Memory-eecient Probabilistic Veriication a New Scheme for Memory-eecient Probabilistic Veriication (2007) (2)
- Aquila_stLFR: assembly based variant calling package for stLFR and hybrid assembly for linked-reads (2019) (2)
- Stanford Center for AI Safety (2018) (2)
- A Center for Correct , Usable , Reliable , Auditable , and Transparent Elections ( ACCURATE ) (2005) (2)
- Alternative Approaches to Hardware Verification (abstract) (1999) (2)
- Formal verification meets simulation (tutorial abstract) (1999) (2)
- Our Elections Are Not Secure. (2017) (2)
- A Refinement Method for Validity Checking of Quantified First-Order Formulas in Hardware Verification (2006) (2)
- A New Reachability Algorithm for Symmetric Multi-processor Architecture (2005) (2)
- Model Checking Cell Biology (2012) (2)
- A Retrospective on Murphi (2008) (2)
- Evolution as Design Engineer (2003) (2)
- Towards in vivo estimation of reaction kinetics using high-throughput metabolomics data: a maximum likelihood approach (2015) (1)
- Hierarchical models of synchronous circuits (1994) (1)
- Better Veri cation Through Symmetry 1 (1993) (1)
- Formal Methods For Probabilistic Programming (2017) (1)
- Mining Large Heterogeneous Cancer Data Sets Using Boolean Implications (2016) (1)
- Correction: Combined Analysis of Murine and Human Microarrays and ChIP Analysis Reveals Genes Associated with the Ability of MYC To Maintain Tumorigenesis (2013) (1)
- Automatic generation of invariants in formal verification of microprocessors and memory systems (2004) (1)
- Computational genetic discoveries that could improve perioperative medicine (2012) (1)
- Formal verification methods: getting around the brick wall (2002) (1)
- branchpoint between B-cell and T-cell development Ly 6 d marks the earliest stage of B-cell specification and identifies the Material Supplemental (2009) (1)
- GutCyc: a Multi-Study Collection of Human Gut Microbiome Metabolic Models (2016) (1)
- Formal Veriication of the Torch Microprocessor Rtl Design (1998) (1)
- Alternative Approaches to Hardware Verification (2000) (1)
- Combination Results for Many SortedTheories with Overlapping (2004) (1)
- IDH1 Mutant AML Is Susceptible to Targeting De Novo Lipid Synthesis Independent of 2-Hydroxyglutarate and Has a Distinct Metabolic Profile from IDH2 Mutant AML (2018) (1)
- 5 Conclusion and Future Work 4 Experimental Results (1995) (1)
- Improved Probabilistic Veri cation by Hash Compaction (2014) (1)
- Point/Counterpoint The U.S. Should Ban Paperless Electronic Voting Machines. Author's reply (2008) (1)
- Floc Workshop on Symbolic Model Checking Preliminary Version Approximate Symbolic Model Checking Using Overlapping Projections (1999) (1)
- Computer Aided Verification (1994) (0)
- 6 Experimental Results and Conclusions 5 Comparison with Previous Work (1995) (0)
- The Open Source Hardening Project (2009) (0)
- Abstract B2-12: A systems biology approach for the discovery of differentiation therapeutics (2015) (0)
- Abstract LB-B07: MiSL: a method for mining synthetic lethal partners of somatic mutations identifies acetyl-CoA carboxylase as a synthetic lethal interactor of the IDH1 mutation in Leukemia (2015) (0)
- Tctl with Freeze Quantiiers Complexity of Reasoning about Real-time (1993) (0)
- Implication Networks from Large Gene-expression Datasets (2007) (0)
- Abstract A1-23: Deciphering the cancer methylome with Boolean implications to find novel drivers of aberrant DNA methylation and actionable drug targets (2015) (0)
- Mutation in Wilms' Tumor 1 Induces DNA Hypermethylation of PRC2 Targets, Blocks Myelomonocytic Differentiation, and Defines a Novel Subtype of AML Responsive to EZH2 Inhibition (2014) (0)
- A Retrospective on Mur phi . (2008) (0)
- Abstract PR13: miR-17-92 mediates MYC oncogene addiction (2015) (0)
- Isocitrate Dehydrogenase 1 Mutant Cancers Are Metabolically Vulnerable to Inhibition of Acetyl CoA Carboxylase Via a 2-Hydroxyglutarate Independent Mechanism (2016) (0)
- Lemma 4 given 0 = S 0 0 S 0 #cell #nodes #time(sec) Trans. #reachable States #cell #nodes #time(sec) Trans. #reachable States (1994) (0)
- Mining TCGA Data Using Boolean Implications Citation (2014) (0)
- Formal Verification and Biology (2008) (0)
- Public Comment on the Uniformed and Overseas Citizens Absentee Voting Act Pilot Program Testing Requirements * Submitted to the United States Election Assistance Commission Accurate Principal Investigators (2010) (0)
- Abstract A27: Systematic discovery of mutation-specific synthetic lethals by mining pan-cancer primary tumor data (2017) (0)
- A Generalization of Shostak ' s Method and it ' sRelationship to the Nelson-Oppen (2007) (0)
- Proceedings of the conference on Electronic voting technology (2008) (0)
- Lineage commitment (WS-033) Chairpersons: Hiroshi Kawamoto, Koji Yasutomo (2010) (0)
- Automatic for GeneralizedMapping Fundamental-Mode (2003) (0)
- A Federal Approach to Formal Hardware Design Verification (2002) (0)
- Deciphering cancer biology using boolean methods (2016) (0)
- The Prostate 69 : 181 ^ 190 ( 2009 ) Temporal Changes inGene Expression Inducedby Sulforaphane inHumanProstateCancerCells (2008) (0)
- SMT-COMP '06 Entry: the Cooperating Validity Checker (CVC) (2005) (0)
- Leukemia Cell Differentiation upon Targeted Therapy Revealed By a Systems Biology Approach (2014) (0)
- Total 6 Exact Hazard-free Logic Minimization. 4 Conditions for a Hazard-free Transition. Exact Two-level Minimization of Hazard-free Logic with Multiple-input Changes 3 (1992) (0)
- Total 6 Exact Hazard-free Logic Minimization. 4 Conditions for a Hazard-free Transition. Exact Two-level Minimization of Hazard-free Logic with Multiple-input Changes 3 (1992) (0)
- An Automatic Verifier (2003) (0)
- Identification of the branchpoint between B and T cell development through MiDReG (138.17) (2009) (0)
- Prefix-closed Trace Structures (2003) (0)
- The battle of accountable voting systems (2004) (0)
- A Retrospective on Murφ (2008) (0)
- State Reduction Methods for Automatic Formal Verification H Signed I H Signed I H Signed I (1996) (0)
- Reliable Probabilistic Veri cation Using (2007) (0)
- Are Cells Asynchronous Circuits? - (Invited Talk) (2011) (0)
- 3.3 Parallel Programs (2011) (0)
- Fundamental-mode Asynchronous Designs by Detecting the Hazards 4.2.2 Multi-input Change Dynamic Logic Hazard Analysis of Multi-level Expressions (0)
- Semi-formal Verification of Memory Systems by Symbolic Simulation (2003) (0)
- Figure 15: a Run of the Bouncing-ball Automaton Automatic Veriication of Nite-state Con- Current Systems Using Temporal-logic Speciications. Acm Transactions on Programming Figure 13: Two-pass Approximative Analysis down up Y 0 Z 0 (1994) (0)
- Fundamental-mode Asynchronous Designs by Detecting the Hazards 4.2.2 Multi-input Change Dynamic Logic Hazard Analysis of Multi-level Expressions (0)
- Ganoderic Acid DM: An Alternative Agent for the Treatment of AdvancedProstate Cancer (2010) (0)
- A u t o m a t i c Verification of the SCI Cache Coherence Protocol * (0)
- Infinite Sequences and Infinite Games (2003) (0)
- Fixpoint Computation: Leaking Gas Burner (1992) (0)
- Abstract A2-35: Discovery of differentiation therapeutics using a systems biology approach (2015) (0)
- Boolean Implication Mining for Synthetic Lethal Interactions in AML Identifies Acetyl-CoA Carboxylase As a Synthetic Lethal Partner of the IDH1 mutation (2015) (0)
- Figure 3: Microprocessor Speciication Bolic Model Checking for Sequential Circuit Veriication. Ieee Transactions on 5 Conclusions and Future Work 4.2 Abstracting the Microprocessor Design 4.1 Proving the Lemmas Using Model-checking (0)
- Wilms' tumor 1 mutation drives DNA hypermethylation in AML and responds to EZH2-inhibitor (2014) (0)
- Computer Aided Verification: 6th International Conference, Cav '94, Stanford, California, Usa, June 21-23, 1994 : Proceedings (1994) (0)
- I Think I Voted: E-Voting vs. Democracy (2006) (0)
- Formal Methods in Computer-Aided Design (2002) (0)
- Model checking Java programs (abstract only) (2000) (0)
- Hierarchical Models of Synchronous Circuits (Abstract) (1994) (0)
- The multiple PDZ domain protein Mpdz/MUPP1 regulates opioid tolerance and opioid-induced hyperalgesia (2016) (0)
This paper list is powered by the following services:
Other Resources About David L. Dill
What Schools Are Affiliated With David L. Dill?
David L. Dill is affiliated with the following schools: