Sciweavers

126 search results - page 8 / 26
» An Extension to Pointer Logic for Verification
Sort
View
KBSE
1999
IEEE
14 years 3 days ago
Advanced Modelling and Verification Techniques Applied to a Cluster File System
This paper describes the application of advanced formal modelling techniques and tools from the CADP toolset to the verification of CFS, a distributed file system kernel. After a ...
Charles Pecheur
POPL
2010
ACM
14 years 5 months ago
Higher-Order Multi-Parameter Tree Transducers and Recursion Schemes for Program Verification
We introduce higher-order, multi-parameter, tree transducers (HMTTs, for short), which are kinds of higher-order tree transducers that take input trees and output a (possibly infi...
Naoki Kobayashi, Naoshi Tabuchi, Hiroshi Unno
ICSE
2004
IEEE-ACM
14 years 8 months ago
Runtime Verification of Statechart Implementations
Our paper introduces a runtime verification framework for concurrent monitoring of applications specified by UML statecharts. The approach offers a considerable degree of granulari...
Gergely Pintér, István Majzik
AES
2008
Springer
97views Cryptology» more  AES 2008»
13 years 7 months ago
Software mechanisms for extensible and scalable 3D visualization of construction operations
This paper presents research that led to the design and implementation of an extensible and scalable software framework for the dynamic 3D visualization of simulated construction ...
Vineet R. Kamat, Julio C. Martínez
CSFW
2011
IEEE
12 years 7 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...