Sciweavers

TACAS
2007
Springer
98views Algorithms» more  TACAS 2007»
14 years 4 months ago
Uppaal/DMC- Abstraction-Based Heuristics for Directed Model Checking
Sebastian Kupferschmid, Klaus Dräger, Jö...
TACAS
2007
Springer
108views Algorithms» more  TACAS 2007»
14 years 4 months ago
State of the Union: Type Inference Via Craig Interpolation
The ad-hoc use of unions to encode disjoint sum types in C programs and the inability of C’s type system to check the safe use of these unions is a long standing source of subtle...
Ranjit Jhala, Rupak Majumdar, Ru-Gang Xu
TACAS
2007
Springer
165views Algorithms» more  TACAS 2007»
14 years 4 months ago
Unfolding Concurrent Well-Structured Transition Systems
Abstract. Our main objective is to combine partial-order methods with verification techniques for infinite-state systems in order to obtain efficient verification algorithms fo...
Frédéric Herbreteau, Grégoire...
TACAS
2007
Springer
110views Algorithms» more  TACAS 2007»
14 years 4 months ago
Counterexamples in Probabilistic Model Checking
This paper considers algorithms and complexity results for the generation of counterexamples in model checking of probabilistic until-formulae in discrete-time Markov chains (DTMCs...
Tingting Han, Joost-Pieter Katoen
TACAS
2007
Springer
144views Algorithms» more  TACAS 2007»
14 years 4 months ago
Detecting Races in Ensembles of Message Sequence Charts
Abstract. The analysis of message sequence charts (MSCs) is highly important in preventing common problems in communication protocols. Detecting race conditions, i.e., possible dis...
Edith Elkind, Blaise Genest, Doron Peled
TACAS
2007
Springer
99views Algorithms» more  TACAS 2007»
14 years 4 months ago
Improved Algorithms for the Automata-Based Approach to Model-Checking
Laurent Doyen, Jean-François Raskin
TACAS
2007
Springer
67views Algorithms» more  TACAS 2007»
14 years 4 months ago
Searching for Shapes in Cryptographic Protocols
Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 4 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
TACAS
2007
Springer
103views Algorithms» more  TACAS 2007»
14 years 4 months ago
A Reachability Predicate for Analyzing Low-Level Software
Reasoning about heap-allocated data structures such as linked lists and arrays is challenging. The reachability predicate has proved to be useful for reasoning about the heap in ty...
Shaunak Chatterjee, Shuvendu K. Lahiri, Shaz Qadee...
TACAS
2007
Springer
99views Algorithms» more  TACAS 2007»
14 years 4 months ago
Assume-Guarantee Synthesis
Krishnendu Chatterjee, Thomas A. Henzinger