Sciweavers

440 search results - page 57 / 88
» A challenge for atomicity verification
Sort
View
CC
2008
Springer
137views System Software» more  CC 2008»
15 years 1 months ago
On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis
Abstract. We discuss the challenges faced by bytecode analyzers designed for code verification compared to similar analyzers for source code. While a bytecode-level analysis brings...
Francesco Logozzo, Manuel Fähndrich
OWLED
2007
15 years 1 months ago
Ontology Engineering for Product Development
This analysis is to identify requirements for a Description Logic (DL) to reason about product descriptions and other information related to product development. The DL is intended...
Henson Graves
104
Voted
WSC
2001
15 years 1 months ago
Enabling smooth and scalable dynamic 3D visualization of discrete-event construction simulations
Visualizing simulated construction operations is an effective means of communicating the logic and the inner working of simulation models in a comprehensive and comprehendible man...
Vineet R. Kamat, Julio C. Martínez
ENTCS
2006
145views more  ENTCS 2006»
14 years 11 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
IGPL
2006
130views more  IGPL 2006»
14 years 11 months ago
Verifying Temporal Heap Properties Specified via Evolution Logic
Abstract. This paper addresses the problem of establishing temporal properties of programs written in languages, such as Java, that make extensive use of the heap to allocate-and d...
Eran Yahav, Thomas W. Reps, Shmuel Sagiv, Reinhard...