Sciweavers

131
Voted
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 6 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ASIAN
2006
Springer
152views Algorithms» more  ASIAN 2006»
15 years 6 months ago
Inferring Disjunctive Postconditions
Polyhedral analysis [9] is an abstract interpretation used for automatic discovery of invariant linear inequalities among numerical varia program. Convexity of this abstract domain...
Corneliu Popeea, Wei-Ngan Chin
ASIAN
2006
Springer
140views Algorithms» more  ASIAN 2006»
15 years 6 months ago
Modeling Urgency in Component-Based Real-Time Systems
A component-based realtime system is a simple model for the server-client relation with time constraints. This paper presents an efficient algorithm, called a blackbox testing algo...
Nguyen Van Tang, Dang Van Hung, Mizuhito Ogawa
ASIAN
2006
Springer
140views Algorithms» more  ASIAN 2006»
15 years 6 months ago
On Completeness of Logical Relations for Monadic Types
Interesting properties of programs can be expressed using contextual equivalence. The latter is difficult to prove directly, hence (pre-)logical relations are often used as a tool ...
Slawomir Lasota, David Nowak, Yu Zhang
ASIAN
2006
Springer
139views Algorithms» more  ASIAN 2006»
15 years 6 months ago
A Symbolic Intruder Model for Hash-Collision Attacks
Yannick Chevalier, Mounira Kourjieh
Algorithms
Top of PageReset Settings