Sciweavers

4488 search results - page 167 / 898
» Properties of NP-Complete Sets
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
14 years 8 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
POPL
2002
ACM
14 years 8 months ago
Role analysis
We present a new role system in which the type (or role) of each object depends on its referencing relationships with other objects, with the role changing as these relationships ...
Viktor Kuncak, Patrick Lam, Martin C. Rinard
CAISE
2009
Springer
14 years 2 months ago
A Heuristic Method for Business Process Model Evaluation
In this paper, we present a heuristic approach for finding errors and possible improvements in business process models. First, we translate the information that is included in a m...
Volker Gruhn, Ralf Laue
ISVLSI
2007
IEEE
131views VLSI» more  ISVLSI 2007»
14 years 2 months ago
Improving the Quality of Bounded Model Checking by Means of Coverage Estimation
Formal verification has become an important step in circuit and system design. A prominent technique is Bounded Model Checking (BMC) which is widely used in industry. In BMC it i...
Ulrich Kühne, Daniel Große, Rolf Drechs...
LICS
2007
IEEE
14 years 2 months ago
Relational Parametricity for Computational Effects
According to Strachey, a polymorphic program is parametric if it applies a uniform algorithm independently of the type instantiations at which it is applied. The notion of relatio...
Rasmus Ejlers Møgelberg, Alex Simpson