Sciweavers

493 search results - page 38 / 99
» Bounded LTL Model Checking with Stable Models
Sort
View
FAC
2007
90views more  FAC 2007»
13 years 7 months ago
Responsiveness and stable revivals
Individual components in an inter-operating system require assurance from other components both of appropriate functionality and of suitable responsiveness. We have developed prope...
Joy N. Reed, A. W. Roscoe, J. E. Sinclair
AMAST
2004
Springer
14 years 1 months ago
Formal JVM Code Analysis in JavaFAN
JavaFAN uses a Maude rewriting logic specification of the JVM semantics as the basis of a software analysis tool with competitive performance. It supports formal analysis of concu...
Azadeh Farzan, José Meseguer, Grigore Rosu
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 7 months ago
Compact Labelings For Efficient First-Order Model-Checking
We consider graph properties that can be checked from labels, i.e., bit sequences, of logarithmic length attached to vertices. We prove that there exists such a labeling for check...
Bruno Courcelle, Cyril Gavoille, Mamadou Moustapha...
CAV
2012
Springer
222views Hardware» more  CAV 2012»
11 years 10 months ago
Leveraging Interpolant Strength in Model Checking
Craig interpolation is a well known method of abstraction successfully used in both hardware and software model checking. The logical strength of interpolants can affect the quali...
Simone Fulvio Rollini, Ondrej Sery, Natasha Sharyg...
CSFW
2012
IEEE
11 years 10 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...