Sciweavers

1058 search results - page 149 / 212
» It's Doomed; We Can Prove It
Sort
View
SIGSOFT
2009
ACM
14 years 10 months ago
Fitting the pieces together: a machine-checked model of safe composition
Programs of a software product line can be synthesized by composing features which implement a unit of program functionality. In most product lines, only some combination of featu...
Benjamin Delaware, William R. Cook, Don S. Batory
ICFP
2004
ACM
14 years 10 months ago
From process logic to program logic
We present a process logic for the -calculus with the linear/affine type discipline (Berger et al. 2001; Berger et al. 2003; Honda and Yoshida 2002; Honda and Yoshida 2003; Honda ...
Kohei Honda
IPSN
2009
Springer
14 years 4 months ago
Algebraic approach to recovering topological information in distributed camera networks
Camera networks are widely used for tasks such as surveillance, monitoring and tracking. In order to accomplish these tasks, knowledge of localization information such as camera l...
Edgar J. Lobaton, Parvez Ahammad, Shankar Sastry
FOAL
2009
ACM
14 years 4 months ago
A machine-checked model of safe composition
Programs of a software product line can be synthesized by composing features which implement some unit of program functionality. In most product lines, only some combination of fe...
Benjamin Delaware, William R. Cook, Don S. Batory
SADFE
2008
IEEE
14 years 4 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....