Sciweavers

1461 search results - page 204 / 293
» Analysis of Constraint Logic Programs
Sort
View
ENTCS
2010
133views more  ENTCS 2010»
13 years 5 months ago
Inference of Session Types From Control Flow
This is a study of a technique for deriving the session type of a program written in a statically typed imperative language from its control flow. We impose on our unlabelled sess...
Peter Collingbourne, Paul H. J. Kelly
ATVA
2008
Springer
87views Hardware» more  ATVA 2008»
14 years 4 days ago
Goanna: Syntactic Software Model Checking
Goanna is an industrial-strength static analysis tool used in academia and industry alike to find bugs in C/C++ programs. Unlike existing approaches Goanna uses the off-the-shelf N...
Ralf Huuck, Ansgar Fehnker, Sean Seefried, Jö...
IFIP
2009
Springer
13 years 7 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
TSE
2010
155views more  TSE 2010»
13 years 4 months ago
Incremental Test Generation for Software Product Lines
Recent advances in mechanical techniques for systematic testing have increased our ability to automatically find subtle bugs, and hence to deploy more dependable software. This pap...
Engin Uzuncaova, Sarfraz Khurshid, Don S. Batory
SIGSOFT
2003
ACM
14 years 11 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler