Sciweavers

232 search results - page 24 / 47
» Symbolic Bounded Conformance Checking of Model Programs
Sort
View
ISPDC
2006
IEEE
14 years 2 months ago
Distributed, Real-Time Programming on Commodity POSIX Systems: A Preliminary Report
We present an incipient implementation of a programming language that allows programming of realtime applications distributed over a network. We have several goals in mind: First,...
Stefan D. Bruda, Petter Haggholm, Scott Stoddard
ICALP
2007
Springer
14 years 2 months ago
Checking and Spot-Checking the Correctness of Priority Queues
We revisit the problem of memory checking considered by Blum et al. [3]. In this model, a checker monitors the behavior of a data structure residing in unreliable memory given an a...
Matthew Chu, Sampath Kannan, Andrew McGregor
ECAI
2010
Springer
13 years 9 months ago
On the Verification of Very Expressive Temporal Properties of Non-terminating Golog Programs
Abstract. The agent programming language GOLOG and the underlying Situation Calculus have become popular means for the modelling and control of autonomous agents such as mobile rob...
Jens Claßen, Gerhard Lakemeyer
SIGSOFT
2003
ACM
14 years 9 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
PUK
2000
13 years 10 months ago
Heuristic Search Planning with BDDs
Abstract. In this paper we study traditional and enhanced BDDbased exploration procedures capable of handling large planning problems. On the one hand, reachability analysis and mo...
Stefan Edelkamp