Sciweavers

197 search results - page 22 / 40
» Exploring Different Constraint-Based Modelings for Program V...
Sort
View
USS
2008
13 years 10 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
IFIP
2001
Springer
14 years 29 days ago
Functional Test Generation using Constraint Logic Programming
— Semi-formal verification based on symbolic simulation offers a good compromise between formal model checking and numerical simulation. The generation of functional test vector...
Zhihong Zeng, Maciej J. Ciesielski, Bruno Rouzeyre
SCP
2010
154views more  SCP 2010»
13 years 7 months ago
An algebraic foundation for automatic feature-based program synthesis
Feature-Oriented Software Development provides a multitude of formalisms, methods, languages, and tools for building variable, customizable, and extensible software. Along differe...
Sven Apel, Christian Lengauer, Bernhard Mölle...
DAGSTUHL
2006
13 years 10 months ago
Model Transformation Technologies in the Context of Modelling Software Systems
Programming technologies have improved continuously during the last decades, but from an Information Systems perspective, some well-known problems associated to the design and impl...
Oscar Pastor
POPL
2005
ACM
14 years 8 months ago
Permission accounting in separation logic
A lightweight logical approach to race-free sharing of heap storage between concurrent threads is described, based on the notion of permission to access. Transfer of permission be...
Richard Bornat, Cristiano Calcagno, Peter W. O'Hea...