Sciweavers

981 search results - page 63 / 197
» Symbolic pointer analysis
Sort
View
ICCS
2007
Springer
14 years 3 months ago
Using FCA for Encoding Closure Operators into Neural Networks
After decades of concurrent development of symbolic and connectionist methods, recent years have shown intensifying efforts of integrating those two paradigms. This paper contribu...
Sebastian Rudolph
JUCS
2006
102views more  JUCS 2006»
13 years 9 months ago
Modeling Inheritance as Coercion in the Kenzo System
Abstract: In this paper the analysis of the data structures used in a symbolic computation system, called Kenzo, is undertaken. We deal with the specification of the inheritance re...
César Domínguez, Julio Rubio, Franci...
PTS
2010
138views Hardware» more  PTS 2010»
13 years 7 months ago
Alternating Simulation and IOCO
We propose a symbolic framework called guarded labeled assignment systems or GLASs and show how GLASs can be used as a foundation for symbolic analysis of various aspects of forma...
Margus Veanes, Nikolaj Bjørner
CSFW
2010
IEEE
14 years 1 days ago
Automating Open Bisimulation Checking for the Spi Calculus
We consider the problem of automating open bisimulation checking for the spi-calculus, an extension of the pi-calculus with cryptographic primitives. The notion of open bisimulatio...
Alwen Tiu, Jeremy E. Dawson
WORDS
2005
IEEE
14 years 2 months ago
Towards a Flow Analysis for Embedded System C Programs
Reliable program Worst-Case Execution Time (WCET) estimates are a key component when designing and verifying real-time systems. One way to derive such estimates is by static WCET ...
Jan Gustafsson, Andreas Ermedahl, Björn Lispe...