Sciweavers

231 search results - page 31 / 47
» Concurrent Reachability Games
Sort
View
LPNMR
2001
Springer
14 years 1 months ago
Bounded LTL Model Checking with Stable Models
In this paper bounded model checking of asynchronous concurrent systems is introduced as a promising application area for answer set programming. As the model of asynchronous syst...
Keijo Heljanko, Ilkka Niemelä
OOPSLA
1999
Springer
14 years 27 days ago
Removing Unnecessary Synchronization in Java
Java programs perform many synchronization operations on data structures. Some of these synchronizations are unnecessary; in particular, if an object is reachable only by a single ...
Jeff Bogda, Urs Hölzle
PODC
1997
ACM
14 years 25 days ago
Collecting Distributed Garbage Cycles by Back Tracing
Systems that store objects at a large number of sites require fault-tolerant and timely garbage collection. A popular technique is to trace each site independently using inter-sit...
Umesh Maheshwari, Barbara Liskov
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
14 years 11 days ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
IFIPTCS
2000
14 years 7 days ago
Hierarchical State Machines
Hierarchical state machines are finite state machines whose states themselves can be other machines. In spite of their popularity in many modeling tools for software design, very l...
Mihalis Yannakakis