Sciweavers

29 search results - page 4 / 6
» fm 2008
Sort
View
FM
2008
Springer
130views Formal Methods» more  FM 2008»
13 years 9 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
JUCS
2008
158views more  JUCS 2008»
13 years 7 months ago
Algebraic Laws for Feature Models
: Software Product Lines (SPL) may be adopted by either bootstrapping existing software products into a SPL, or extending an existing SPL to encompass an additional software produc...
Rohit Gheyi, Tiago Massoni, Paulo Borba
DM
1998
62views more  DM 1998»
13 years 7 months ago
Bipartite subgraphs of integer weighted graphs
For every integer p > 0 let f(p) be the minimum possible value of the maximum weight of a cut in an integer weighted graph with total weight p. It is shown that for every large...
Noga Alon, Eran Halperin
FM
2008
Springer
192views Formal Methods» more  FM 2008»
13 years 9 months ago
CoVaC: Compiler Validation by Program Analysis of the Cross-Product
Abstract. The paper presents a deductive framework for proving program equivalence and its application to automatic verification of transformations performed by optimizing compiler...
Anna Zaks, Amir Pnueli
FM
2008
Springer
75views Formal Methods» more  FM 2008»
13 years 9 months ago
Masking Faults While Providing Bounded-Time Phased Recovery
We focus on synthesis techniques for transforming existing fault-intolerant real-time programs to fault-tolerant programs that provide phased recovery. A fault-tolerant program is ...
Borzoo Bonakdarpour, Sandeep S. Kulkarni