Sciweavers

3224 search results - page 505 / 645
» On Checking Model Checkers
Sort
View
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
14 years 2 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
DATE
2009
IEEE
64views Hardware» more  DATE 2009»
14 years 2 months ago
Speculative reduction-based scalable redundancy identification
The process of sequential redundancy identification is the cornerstone of sequential synthesis and equivalence checking frameworks. The scalability of the proof obligations inhere...
Hari Mony, Jason Baumgartner, Alan Mishchenko, Rob...
APSEC
2004
IEEE
14 years 1 months ago
Tool Supported Development of Service-Based Systems
Service-based systems engineering is a recent paradigm that has proven useful for the development of multifunctional systems, whose functions may be used in different contexts and...
Martin Deubler, Johannes Grünbauer, Gerhard P...
ATVA
2006
Springer
153views Hardware» more  ATVA 2006»
14 years 1 months ago
Learning-Based Symbolic Assume-Guarantee Reasoning with Automatic Decomposition
Abstract. Compositional reasoning aims to improve scalability of verification tools by reducing the original verification task into subproblems. The simplification is typically bas...
Wonhong Nam, Rajeev Alur
CP
2004
Springer
14 years 1 months ago
Unary Resource Constraint with Optional Activities
Scheduling is one of the most successful application areas of constraint programming mainly thanks to special global constraints designed to model resource restrictions. Among thes...
Petr Vilím, Roman Barták, Ondrej Cep...