Abstract. Overload checking, forbidden regions, edge finding, and notfirst/not-last detection are well-known propagation rules to prune the start times of activities which have t...
Debugging, testing, and profiling microcontroller programs are notoriously difficult. The lack of supporting software such as an operating system, a narrow interface to the hard...
We present an algorithm for generating the Voronoi cells for a set of rational C1 -continuous planar closed curves, which is precise up to machine precision. Initially, bisectors ...
Iddo Hanniel, Ramanathan Muthuganapathy, Gershon E...
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
We introduce a concrete semantics for floating-point operations which describes the propagation of roundoff errors throughout a calculation. This semantics is used to assert the co...