Sciweavers

1528 search results - page 237 / 306
» Performance Assertion Checking
Sort
View
LICS
1999
IEEE
14 years 1 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
ERSHOV
1999
Springer
14 years 1 months ago
Current Directions in Hyper-Programming
The traditional representation of a program is as a linear sequence of text. At some stage in the execution sequence the source text is checked for type correctness and its transla...
Ronald Morrison, Richard C. H. Connor, Quintin I. ...
ICSE
1999
IEEE-ACM
14 years 1 months ago
Residual Test Coverage Monitoring
Structural coverage criteria are often used as an indicator of the thoroughness of testing, but complete satisfaction of a criterion is seldom achieved. When a software product is...
Christina Pavlopoulou, Michal Young
ATAL
1997
Springer
14 years 1 months ago
Approximate Reasoning about Combined Knowledge
Abstract. Just as cooperation in multi-agent systems is a central issue for solving complex tasks, so too is the ability for an intelligent agent to reason about combined knowledge...
Frédéric Koriche
RTA
1993
Springer
14 years 1 months ago
Redundancy Criteria for Constrained Completion
This paper studies completion in the case of equations with constraints consisting of rstorder formulae over equations, disequations, and an irreducibility predicate. We present s...
Christopher Lynch, Wayne Snyder