Sciweavers

CAV
2015
Springer
22views Hardware» more  CAV 2015»
8 years 7 days ago
Poling: SMT Aided Linearizability Proofs
Abstract. Proofs of linearizability of concurrent data structures generally rely on identifying linearization points to establish a simulation argument between the implementation a...
He Zhu, Gustavo Petri, Suresh Jagannathan
CAV
2015
Springer
18views Hardware» more  CAV 2015»
8 years 7 days ago
SMT and POR Beat Counter Abstraction: Parameterized Model Checking of Threshold-Based Distributed Algorithms
POR beat Counter Abstraction: Parameterized Model Checking of Threshold-Based Distributed Algorithms Igor Konnov, Helmut Veith, and Josef Widder TU Wien (Vienna University of Techn...
Igor Konnov, Helmut Veith, Josef Widder
CAV
2015
Springer
22views Hardware» more  CAV 2015»
8 years 7 days ago
Formal Design and Safety Analysis of AIR6110 Wheel Brake System
Abstract. SAE Aerospace Information Report 6110, “Contiguous Aircraft/System Development Process Example,” follows the development of a complex wheel brake system (WBS) using p...
Marco Bozzano, Alessandro Cimatti, Anthony Fernand...
CAV
2015
Springer
15views Hardware» more  CAV 2015»
8 years 7 days ago
Norn: An SMT Solver for String Constraints
Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang ...
CAV
2015
Springer
15views Hardware» more  CAV 2015»
8 years 7 days ago
Deductive Program Repair
Abstract. We present an approach to program repair and its application to programs with recursive functions over unbounded data types. Our approach formulates program repair in the...
Etienne Kneuss, Manos Koukoutos, Viktor Kuncak
CARDIS
2015
Springer
24views Hardware» more  CARDIS 2015»
8 years 7 days ago
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
Fresh re-keying is a type of protocol which aims at splitting the task of protecting an encryption/authentication scheme against side-channel attacks in two parts. One part, a re-k...
Christoph Dobraunig, François Koeune, Stefa...
CARDIS
2015
Springer
25views Hardware» more  CARDIS 2015»
8 years 7 days ago
Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations
Abstract. Rank estimation is an important tool for side-channel evaluations laboratories. It allows determining the remaining security after an attack has been performed, quantifi...
Romain Poussier, Vincent Grosso, François-X...
RV
2015
Springer
12views Hardware» more  RV 2015»
8 years 7 days ago
Collision Avoidance for Mobile Robots with Limited Sensing and Limited Information About the Environment
Abstract. This paper addresses the problem of safely navigating a mobile robot with limited sensing capability and limited information about stationary obstacles. We consider two s...
Dung Phan, Junxing Yang, Denise Ratasich, Radu Gro...
RV
2015
Springer
13views Hardware» more  RV 2015»
8 years 7 days ago
A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System
Abstract. Although runtime monitoring is a promising technique to improve the verification of complex safety-critical systems, the general design trend towards utilizing black-box...
Aaron Kane, Omar Chowdhury, Anupam Datta, Philip K...
RV
2015
Springer
7views Hardware» more  RV 2015»
8 years 7 days ago
Monitoring and Measuring Hybrid Behaviors A Tutorial
Continuous and hybrid behaviors naturally arise from many dynamical systems. In this tutorial, we present state-of-the-art techniques for qualitative and quantitative reasoning abo...
Dejan Nickovic