Sciweavers

2082 search results - page 116 / 417
» Change Paths in Reasoning!
Sort
View
ACTA
2010
191views more  ACTA 2010»
13 years 9 months ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar
INFSOF
2007
104views more  INFSOF 2007»
13 years 9 months ago
A state-based approach to integration testing based on UML models
: Correct functioning of object-oriented software depends upon the successful integration of classes. While individual classes may function correctly, several new faults can arise ...
Shaukat Ali, Lionel C. Briand, Muhammad Jaffar-Ur ...
IEPOL
2010
107views more  IEPOL 2010»
13 years 7 months ago
On the convergence of wired and wireless access network architectures
Wired and wireless access networks continue to evolve toward higher-capacity, multi-service systems. Recent wireless broadband networks such as 3G LTE and WiMax provide a general-...
William H. Lehr, John M. Chapin
TMC
2012
11 years 11 months ago
The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks
—We present the boomerang protocol to efficiently retain information at a particular geographic location in a sparse network of highly mobile nodes without using infrastructure ...
Tingting Sun, Bin Zan, Yanyong Zhang, Marco Grutes...
CSL
2004
Springer
14 years 24 days ago
A Functional Scenario for Bytecode Verification of Resource Bounds
We consider a scenario where (functional) programs in pre-compiled form are exchanged among untrusted parties. Our contribution is a system of annotations for the code that can be ...
Roberto M. Amadio, Solange Coupet-Grimal, Silvano ...