default search action
Cindy Eisner
Person information
- affiliation: IBM Research - Haifa, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c20]Fady Copty, Matan Danos, Orit Edelstein, Cindy Eisner, Dov Murik, Benjamin Zeltser:
Accurate Malware Detection by Extreme Abstraction. ACSAC 2018: 101-111 - [p1]Cindy Eisner, Dana Fisman:
Functional Specification of Hardware via Temporal Logic. Handbook of Model Checking 2018: 795-829 - 2014
- [j7]Cindy Eisner, Dana Fisman, John Havlicek:
Safety and Liveness, Weakness and Strength, and the Underlying Topological Relations. ACM Trans. Comput. Log. 15(2): 13:1-13:44 (2014) - 2013
- [c19]Oshri Adler, Cindy Eisner, Tatyana Veksler:
Relative Equivalence in the Presence of Ambiguity. CAV 2013: 430-446
2000 – 2009
- 2009
- [j6]Cindy Eisner, Amir Nahir, Karen Yorav:
Functional verification of power gated designs by compositional reasoning. Formal Methods Syst. Des. 35(1): 40-55 (2009) - [c18]Eli Arbel, Cindy Eisner, Oleg Rokhlenko:
Resurrecting infeasible clock-gating functions. DAC 2009: 160-165 - 2008
- [c17]Cindy Eisner, Amir Nahir, Karen Yorav:
Functional Verification of Power Gated Designs by Compositional Reasoning. CAV 2008: 433-445 - [c16]Cindy Eisner, Dana Fisman:
Augmenting a Regular Expression-Based Temporal Logic with Local Variables. FMCAD 2008: 1-8 - [c15]Cindy Eisner, Dana Fisman:
Structural Contradictions. Haifa Verification Conference 2008: 164-178 - [c14]Emmanuel Zarpas, Cindy Eisner, Sivan Tal:
Policy Validation for System Automation: A Case Study. POLICY 2008: 46-53 - 2007
- [c13]Cindy Eisner:
PSL for Runtime Verification: Theory and Practice. RV 2007: 1-8 - 2006
- [b1]Cindy Eisner, Dana Fisman:
A Practical Introduction to PSL. Series on Integrated Circuits and Systems, Springer 2006, ISBN 978-0-387-35313-5, pp. 1-240 - [c12]Sharon Barner, Cindy Eisner, Ziv Glazberg, Daniel Kroening, Ishai Rabinovitz:
ExpliSAT: Guiding SAT-Based Software Verification with Explicit States. Haifa Verification Conference 2006: 138-154 - 2005
- [j5]Cindy Eisner:
Formal verification of software source code through semi-automatic modeling. Softw. Syst. Model. 4(1): 14-31 (2005) - [c11]Cindy Eisner, Dana Fisman, John Havlicek:
A topological characterization of weakness. PODC 2005: 1-8 - 2003
- [j4]Shoham Ben-David, Cindy Eisner, Daniel Geist, Yaron Wolfsthal:
Model Checking at IBM. Formal Methods Syst. Des. 22(2): 101-108 (2003) - [c10]Cindy Eisner, Dana Fisman, John Havlicek, Yoad Lustig, Anthony McIsaac, David Van Campenhout:
Reasoning with Temporal Logic on Truncated Paths. CAV 2003: 27-39 - [c9]Cindy Eisner, Dana Fisman, John Havlicek, Anthony McIsaac, David Van Campenhout:
The Definition of a Temporal Clock Operator. ICALP 2003: 857-870 - 2002
- [j3]Cindy Eisner:
Using symbolic CTL model checking to verify the railway stations of Hoorn-Kersenboogerd and Heerhugowaard. Int. J. Softw. Tools Technol. Transf. 4(1): 107-124 (2002) - [c8]Cindy Eisner, Doron A. Peled:
Comparing Symbolic and Explicit Model Checking of a Software System. SPIN 2002: 230-239 - 2001
- [j2]Ilan Beer, Shoham Ben-David, Cindy Eisner, Yoav Rodeh:
Efficient Detection of Vacuity in Temporal Model Checking. Formal Methods Syst. Des. 18(2): 141-163 (2001) - [j1]Yael Abarbanel-Vinov, Neta Aizenbud-Reshef, Ilan Beer, Cindy Eisner, Daniel Geist, Tamir Heyman, Iris Reuveni, Eran Rippel, Irit Shitsevalov, Yaron Wolfsthal, Tali Yatzkar-Haham:
On the Effective Deployment of Functional Formal Verification. Formal Methods Syst. Des. 19(1): 35-44 (2001) - [c7]Ilan Beer, Shoham Ben-David, Cindy Eisner, Dana Fisman, Anna Gringauze, Yoav Rodeh:
The Temporal Logic Sugar. CAV 2001: 363-367 - [c6]Cindy Eisner:
Model checking the garbage collection mechanism of SMV. Workshop on Software Model Checking @ CAV 2001: 289-303 - 2000
- [c5]Cindy Eisner, Irit Shitsevalov, Russ Hoover, Wayne G. Nation, Kyle L. Nelson, Ken Valk:
A methodology for formal design of hardware control with application to cache coherence protocols. DAC 2000: 724-729
1990 – 1999
- 1999
- [c4]Cindy Eisner:
Using Symbolic Model Checking to Verify the Railway Stations of Hoorn-Kersenboogerd and Heerhugowaard. CHARME 1999: 97-109 - 1997
- [c3]Ilan Beer, Shoham Ben-David, Cindy Eisner, Yoav Rodeh:
Efficient Detection of Vacuity in ACTL Formulaas. CAV 1997: 279-290 - [c2]Ilan Beer, Shoham Ben-David, Cindy Eisner, Daniel Geist, Leonid Gluhovsky, Tamir Heyman, Avner Landver, P. Paanah, Yoav Rodeh, G. Ronin, Yaron Wolfsthal:
RuleBase: Model Checking at IBM. CAV 1997: 480-483 - 1996
- [c1]Ilan Beer, Shoham Ben-David, Cindy Eisner, Avner Landver:
RuleBase: An Industry-Oriented Formal Verification Tool. DAC 1996: 655-660
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint