Sciweavers

1205 search results - page 15 / 241
» Program Extraction from Large Proof Developments
Sort
View
PLDI
2010
ACM
14 years 8 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
CADE
2010
Springer
14 years 17 hour ago
Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion
In order to support the verification of programs, verification tools such as ACL2 or Isabelle try to extract suitable induction axioms from the definitions of terminating, recursiv...
Markus Aderhold
ISMIR
2004
Springer
90views Music» more  ISMIR 2004»
14 years 4 months ago
Automatic extraction of music descriptors from acoustic signals
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the f...
François Pachet, Aymeric Zils
COMPSAC
1996
IEEE
14 years 3 months ago
Business Rule Extraction from Legacy Code
Business rules are operational rules that business organizationsfollow to peq%rm various activities. Over time, business rules evolve and the software that implemented them are al...
Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiao...
ICSEA
2006
IEEE
14 years 5 months ago
Extracting Simulation Models from Complex Embedded Real-Time Systems
A modeling process is presented for extracting timingaccurate simulation models from complex embedded realtime systems. The process is supported by two complementary methods for t...
Johan Andersson, Joel Huselius, Christer Norstr&ou...