Sciweavers

553 search results - page 64 / 111
» Verified, Executable Parsing
Sort
View
RAID
2007
Springer
14 years 2 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
SKG
2006
IEEE
14 years 2 months ago
Dynamic Setting, Verification and Adjustment of Upper Bound Constraints in Grid Workflow Systems
Upper bound constraints are often set when complex scientific or business processes are modelled as grid workflow specifications. However, many existing processes such as climate ...
Jinjun Chen, Yun Yang
ACL2
2006
ACM
14 years 2 months ago
Implementing a cost-aware evaluator for ACL2 expressions
One of ACL2’s most interesting features is that it is executable, so users can run the programs that they verify, and debug them during verification. In fact, the ACL2 implemen...
Ruben Gamboa, John R. Cowles
CHARME
2003
Springer
196views Hardware» more  CHARME 2003»
14 years 1 months ago
Analyzing the Intel Itanium Memory Ordering Rules Using Logic Programming and SAT
We present a non-operational approach to specifying and analyzing shared memory consistency models. The method uses higher order logic to capture a complete set of ordering constra...
Yue Yang, Ganesh Gopalakrishnan, Gary Lindstrom, K...
LCPC
2009
Springer
14 years 1 months ago
Enforcing Textual Alignment of Collectives Using Dynamic Checks
Abstract. Many parallel programs are written in a single-program, multipledata (SPMD) style, in which synchronization is provided using collective operations that all threads execu...
Amir Kamil, Katherine A. Yelick