Sciweavers

SCP
2008
91views more  SCP 2008»
13 years 4 months ago
Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic
In [5] we build a formal verification technique for game based correctness proofs of cryptograhic algorithms based on a probabilistic Hoare style logic [10]. An important step towa...
Jerry den Hartog
SCP
2008
64views more  SCP 2008»
13 years 4 months ago
Design and verification of long-running transactions in a timed framework
Ruggero Lanotte, Andrea Maggiolo-Schettini, Paolo ...
SCP
2008
91views more  SCP 2008»
13 years 4 months ago
Stable, flexible, peephole pretty-printing
Programmers working on large software systems are faced with an extremely complex, information-rich environment. To help navigate through this, modern development environments all...
Stoney Jackson, Premkumar T. Devanbu, Kwan-Liu Ma
SCP
2008
53views more  SCP 2008»
13 years 4 months ago
Stratego/XT 0.17. A language and toolset for program transformation
Martin Bravenboer, Karl Trygve Kalleberg, Rob Verm...
SCP
2008
86views more  SCP 2008»
13 years 4 months ago
Quantifying the yield of risk-bearing IT-portfolios
We proposed a method to quantify the yield of an IT-investment portfolio in an environment of uncertainty and risk. For various common implementation scenarios such as growing dem...
R. J. Peters, Chris Verhoef
SCP
2008
66views more  SCP 2008»
13 years 4 months ago
Characterizing navigation maps for web applications with the NMM approach
Antonio Navarro, Alfredo Fernández-Valmayor...
SCP
2008
144views more  SCP 2008»
13 years 4 months ago
Implicit ownership types for memory management
Abstract. The Real-time Specification for Java (RTSJ) introduced a range of language features for explicit memory management. While the RTSJ gives programmers fine control over mem...
Tian Zhao, Jason Baker, James Hunt, James Noble, J...
SCP
2008
89views more  SCP 2008»
13 years 4 months ago
A challenge for atomicity verification
An unpublished algorithm of Haldar and Vidyasankar implements an atomic variable of an arbitrary type T for one writer and one reader by means of 4 unsafe variables of type T , th...
Wim H. Hesselink
SCP
2008
55views more  SCP 2008»
13 years 4 months ago
XPi: A typed process calculus for XML messaging
Lucia Acciai, Michele Boreale
SCP
2008
128views more  SCP 2008»
13 years 4 months ago
Mobile JikesRVM: A framework to support transparent Java thread migration
Today's complex applications must face the distribution of data and code among different network nodes. Computation in distributed contexts is demanding increasingly powerful...
Raffaele Quitadamo, Giacomo Cabri, Letizia Leonard...