Sciweavers

981 search results - page 30 / 197
» Symbolic pointer analysis
Sort
View
CONCUR
2005
Springer
14 years 2 months ago
Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems
We introduce two abstract models for multithreaded programs based on dynamic networks of pushdown systems. We address the problem of symbolic reachability analysis for these models...
Ahmed Bouajjani, Markus Müller-Olm, Tayssir T...
CADE
2011
Springer
12 years 8 months ago
ASASP: Automated Symbolic Analysis of Security Policies
We describe asasp, a symbolic reachability procedure for the analysis of administrative access control policies. The tool represents access policies and their administrative action...
Francesco Alberti, Alessandro Armando, Silvio Rani...
FOSAD
2009
Springer
14 years 3 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
ISCAS
2006
IEEE
65views Hardware» more  ISCAS 2006»
14 years 2 months ago
Symbolic analysis of bifurcations in planar variable structure systems
— In this paper a methodology to the analysis of bifurcations of variable structure systems is proposed. This methodology, based on the use of symbolic computation packages, is d...
Ubirajara F. Moreno, Eugênio B. Castelan, Ed...
DAC
2008
ACM
14 years 9 months ago
Symbolic noise analysis approach to computational hardware optimization
This paper addresses the problem of computational error modeling and analysis. Choosing different word-lengths for each functional unit in hardware implementations of numerical al...
Arash Ahmadi, Mark Zwolinski