Sciweavers

1005 search results - page 128 / 201
» Patterns for Refinement Automation
Sort
View
APLAS
2010
ACM
13 years 8 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
KI
2010
Springer
13 years 2 months ago
Differential Dynamic Logics
Hybrid systems are models for complex physical systems and are defined as dynamical systems with interacting discrete transitions and continuous evolutions along differential equa...
André Platzer
GIS
2010
ACM
13 years 5 months ago
Querying geo-social data by bridging spatial networks and social networks
Recording the location of people using location-acquisition technologies, such as GPS, allows generating life patterns, which associate people to places they frequently visit. Con...
Yerach Doytsher, Ben Galon, Yaron Kanza
DAC
2006
ACM
14 years 8 months ago
Timing-based delay test for screening small delay defects
The delay fault test pattern set generated by timing unaware commercial ATPG tools mostly affects very short paths, thereby increasing the escape chance of smaller delay defects. ...
Nisar Ahmed, Mohammad Tehranipoor, Vinay Jayaram
SIGSOFT
2005
ACM
14 years 8 months ago
SOBER: statistical model-based bug localization
Automated localization of software bugs is one of the essential issues in debugging aids. Previous studies indicated that the evaluation history of program predicates may disclose...
Chao Liu 0001, Jiawei Han, Long Fei, Samuel P. Mid...