Sciweavers

68 search results - page 13 / 14
» Automatically Validating Temporal Safety Properties of Inter...
Sort
View
POPL
2003
ACM
14 years 5 months ago
From symptom to cause: localizing errors in counterexample traces
There is significant room for improving users' experiences with model checking tools. An error trace produced by a model checker can be lengthy and is indicative of a symptom...
Thomas Ball, Mayur Naik, Sriram K. Rajamani
CSFW
2006
IEEE
13 years 11 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
DATE
2004
IEEE
130views Hardware» more  DATE 2004»
13 years 9 months ago
Utilizing Formal Assertions for System Design of Network Processors
System level modeling with executable languages such as C/C++ has been crucial in the development of large electronic systems from general processors to application specific desig...
Xi Chen, Yan Luo, Harry Hsieh, Laxmi N. Bhuyan, Fe...
ESOP
2006
Springer
13 years 9 months ago
A Verification Methodology for Model Fields
Model fields are specification-only fields that encode abstractions of the concrete state of a data structure. They allow specifications to describe the behavior of object-oriented...
K. Rustan M. Leino, Peter Müller
SPIN
2005
Springer
13 years 11 months ago
Behavioural Models for Hierarchical Components
We describe a method for the specification and verification of the dynamic behaviour of component systems. Building applications using a component framework allows the developers...
Tomás Barros, Ludovic Henrio, Eric Madelain...