Sciweavers

ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 21 days ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ASIAN
2006
Springer
152views Algorithms» more  ASIAN 2006»
15 years 21 days ago
Inferring Disjunctive Postconditions
Polyhedral analysis [9] is an abstract interpretation used for automatic discovery of invariant linear inequalities among numerical varia program. Convexity of this abstract domain...
Corneliu Popeea, Wei-Ngan Chin
ASIAN
2006
Springer
140views Algorithms» more  ASIAN 2006»
15 years 21 days ago
Modeling Urgency in Component-Based Real-Time Systems
A component-based realtime system is a simple model for the server-client relation with time constraints. This paper presents an efficient algorithm, called a blackbox testing algo...
Nguyen Van Tang, Dang Van Hung, Mizuhito Ogawa
ASIAN
2006
Springer
140views Algorithms» more  ASIAN 2006»
15 years 21 days ago
On Completeness of Logical Relations for Monadic Types
Interesting properties of programs can be expressed using contextual equivalence. The latter is difficult to prove directly, hence (pre-)logical relations are often used as a tool ...
Slawomir Lasota, David Nowak, Yu Zhang
ASIAN
2006
Springer
139views Algorithms» more  ASIAN 2006»
15 years 21 days ago
A Symbolic Intruder Model for Hash-Collision Attacks
Yannick Chevalier, Mounira Kourjieh
Algorithms
Top of PageReset Settings