Sciweavers

160 search results - page 21 / 32
» Structuring the verification of heap-manipulating programs
Sort
View
POPL
2005
ACM
14 years 10 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
JCST
2010
198views more  JCST 2010»
13 years 4 months ago
Certification of Thread Context Switching
With recent efforts to build foundational certified software systems, two different approaches have been proposed to certify thread context switching. One is to certify both thread...
Yu Guo, Xinyu Jiang, Yiyun Chen
CSL
2006
Springer
14 years 1 months ago
Game Quantification on Automatic Structures and Hierarchical Model Checking Games
Game quantification is an expressive concept and has been studied in model theory and descriptive set theory, especially in relation to infinitary logics. Automatic structures on t...
Lukasz Kaiser
SIGSOFT
2004
ACM
14 years 3 months ago
Using an SQL coverage measurement for testing database applications
Many software applications have a component based on database management systems in which information is generally handled through SQL queries embedded in the application code. Wh...
María José Suárez Cabal, Javi...
CODES
2008
IEEE
13 years 11 months ago
Model checking SystemC designs using timed automata
SystemC is widely used for modeling and simulation in hardware/software co-design. Due to the lack of a complete formal semantics, it is not possible to verify SystemC designs. In...
Paula Herber, Joachim Fellmuth, Sabine Glesner