Sciweavers

322 search results - page 43 / 65
» Developing and Reasoning About Probabilistic Programs in pGC...
Sort
View
PLDI
2009
ACM
14 years 2 months ago
Language-based security on Android
In this paper, we initiate a formal study of security on Android: Google’s new open-source platform for mobile devices. Specifically, we present a core typed language to descri...
Avik Chaudhuri
LPAR
2007
Springer
14 years 1 months ago
Why Would You Trust B ?
Abstract. The use of formal methods provides confidence in the correctness of developments. Yet one may argue about the actual level of confidence obtained when the method itself...
Éric Jaeger, Catherine Dubois
AADEBUG
2005
Springer
14 years 1 months ago
Automated bug isolation via program chipping
This paper introduces program chipping, a simple yet effective technique to isolate bugs. This technique automatically removes or chips away parts of a program so that the part t...
Chad D. Sterling, Ronald A. Olsson
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 7 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
INFOCOM
2008
IEEE
14 years 2 months ago
On Optimal Sizing of Tiered Network Services
Abstract— We develop an economic model for networks offering tiered services and we formulate the problem of selecting the service tiers from three perspectives: one that conside...
Qian Lv, George N. Rouskas