Sciweavers

231 search results - page 29 / 47
» Mu-calculus path checking
Sort
View
JCST
2007
97views more  JCST 2007»
15 years 2 months ago
Improved Collision Attack on Hash Function MD5
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that ...
Jie Liang, Xue-Jia Lai
234
Voted
POPL
2004
ACM
16 years 2 months ago
Incremental execution of transformation specifications
We aim to specify program transformations in a declarative style, and then to generate executable program transformers from such specifications. Many transformations require non-t...
Ganesh Sittampalam, Oege de Moor, Ken Friis Larsen
122
Voted
IEEEPACT
2002
IEEE
15 years 7 months ago
Eliminating Exception Constraints of Java Programs for IA-64
Java exception checks are designed to ensure that any faulting instruction causing a hardware exception does not terminate the program abnormally. These checks, however, impose so...
Kazuaki Ishizaki, Tatsushi Inagaki, Hideaki Komats...
APLAS
2008
ACM
15 years 4 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...
110
Voted
MEDINFO
2007
102views Healthcare» more  MEDINFO 2007»
15 years 3 months ago
Automatic Treatment of Temporal Issues in Clinical Guidelines in the GLARE System
Temporal constraints play a fundamental role in clinical guidelines. For example, temporal indeterminacy, constraints about duration, delays between actions and periodic repetitio...
Luca Anselma, Paolo Terenziani, Stefania Montani, ...