Sciweavers

1415 search results - page 189 / 283
» Verified systems by composition from verified components
Sort
View
CAV
2001
Springer
121views Hardware» more  CAV 2001»
14 years 2 months ago
A Practical Approach to Coverage in Model Checking
In formal verification, we verify that a system is correct with respect to a specification. When verification succeeds and the system is proven to be correct, there is still a q...
Hana Chockler, Orna Kupferman, Robert P. Kurshan, ...
WOLLIC
2010
Springer
14 years 2 months ago
A CTL-Based Logic for Program Abstractions
sed Logic for Program Abstractions Martin Lange1 and Markus Latte2 1 Dept. of Computer Science, University of Kassel, Germany 2 Dept. of Computer Science, Ludwig-Maximilians-Univer...
Martin Lange, Markus Latte
IJCAI
1989
13 years 11 months ago
A Correct Non-Monotonic ATMS
In this paper, we investigate technical methods to deal with exceptions, inconsistencies, and ambiguity. Existing reason maintenance systems are only suitable for some of these pr...
Ulrich Junker
ENGL
2008
116views more  ENGL 2008»
13 years 10 months ago
A Low Cost Machine Translation Method for Cross-Lingual Information Retrieval
In one form or another language translation is a necessary part of cross-lingual information retrieval systems. Often times this is accomplished using machine translation systems....
David B. Bracewell, Fuji Ren, Shingo Kuroiwa
WORM
2003
13 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...