Sciweavers

160 search results - page 23 / 32
» Structuring the verification of heap-manipulating programs
Sort
View
POPL
2009
ACM
14 years 10 months ago
The theory of deadlock avoidance via discrete control
Deadlock in multithreaded programs is an increasingly important problem as ubiquitous multicore architectures force parallelization upon an ever wider range of software. This pape...
Manjunath Kudlur, Scott A. Mahlke, Stéphane...
CSFW
2004
IEEE
14 years 1 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
CAV
2008
Springer
139views Hardware» more  CAV 2008»
13 years 12 months ago
CSIsat: Interpolation for LA+EUF
We present CSIsat, an interpolating decision procedure for the quantifier-free theory of rational linear arithmetic and equality with uninterpreted function symbols. Our implementa...
Dirk Beyer, Damien Zufferey, Rupak Majumdar
POPL
2007
ACM
14 years 10 months ago
A very modal model of a modern, major, general type system
We present a model of recursive and impredicatively quantified types with mutable references. We interpret in this model all of the type constructors needed for typed intermediate...
Andrew W. Appel, Christopher D. Richards, Jé...
VCIP
2003
124views Communications» more  VCIP 2003»
13 years 11 months ago
MPEG-7 content-based analysis/retrieval system and its applications
In this paper, we proposed a content-based multimedia analysis/retrieval system basing mainly on the MPEG-7 defined features. Some new and specific features are also included for ...
Jin-Hau Kuo, Ja-Ling Wu