Sciweavers

890 search results - page 120 / 178
» Programming language methods in computer security
Sort
View
ISMB
1994
13 years 11 months ago
Genetic Map Construction with Constraints
Apilot program,CME,is describedfor generatinga physical genetic mapfromhybridization fingerprintingdata. CMEis implementedin the parallel constraint logic programming language Eli...
Dominic A. Clark, Christopher J. Rawlings, Sylvie ...
POPL
2002
ACM
14 years 10 months ago
Predicate abstraction for software verification
e Abstraction for Software Verification Cormac Flanagan Shaz Qadeer Compaq Systems Research Center 130 Lytton Ave, Palo Alto, CA 94301 Software verification is an important and di...
Cormac Flanagan, Shaz Qadeer
PLDI
2010
ACM
14 years 7 months ago
Breadcrumbs: Efficient Context Sensitivity for Dynamic Bug Detection Analyses
Calling context--the set of active methods on the stack--is critical for understanding the dynamic behavior of large programs. Dynamic program analysis tools, however, are almost ...
Michael D. Bond, Graham Z. Baker, Samuel Z. Guyer
CPHYSICS
2008
96views more  CPHYSICS 2008»
13 years 10 months ago
Moment distributions of clusters and molecules in the adiabatic rotor model
We present a Fortran program to compute the distribution of dipole moments of free particles for use in analyzing molecular beams experiments that measure moments by deflection in...
G. E. Ballentine, G. F. Bertsch, N. Onishi, K. Yab...
PPDP
2010
Springer
13 years 7 months ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch