Sciweavers

337 search results - page 53 / 68
» Predicate abstraction for software verification
Sort
View
123
Voted
ISSTA
2000
ACM
15 years 7 months ago
Verifying properties of process definitions
ions for concise and precise specification of such control, but balance this with visualization support to help users also obtain intuitive insights. The underlying complexhese con...
Jamieson M. Cobleigh, Lori A. Clarke, Leon J. Oste...
121
Voted
CORR
2010
Springer
111views Education» more  CORR 2010»
15 years 3 months ago
Reducing the Number of Annotations in a Verification-oriented Imperative Language
Abstract. Automated software verification is a very active field of research which has made enormous progress both in theoretical and practical aspects. Recently, an important amou...
Guido de Caso, Diego Garbervetsky, Daniel Gor&iacu...
131
Voted
CCS
2009
ACM
16 years 4 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
SIGSOFT
2007
ACM
16 years 4 months ago
Differential testing: a new approach to change detection
Regression testing, as it's commonly practiced, is unsound due to inconsistent test repair and test addition. This paper presents a new technique, differential testing, that ...
Robert B. Evans, Alberto Savoia
130
Voted
RE
2004
Springer
15 years 9 months ago
From Aspectual Requirements to Proof Obligations for Aspect-Oriented Systems
Aspect-oriented software development (AOSD) techniques support systematic modularization and composition of crosscutting concerns. Though AOSD techniques have been proposed to han...
Shmuel Katz, Awais Rashid