Sciweavers

2488 search results - page 304 / 498
» An improvement in formal verification
Sort
View
107
Voted
ACSAC
2010
IEEE
14 years 11 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
ATVA
2010
Springer
93views Hardware» more  ATVA 2010»
14 years 11 months ago
A Specification Logic for Exceptions and Beyond
Exception handling is an important language feature for building more robust software programs. It is primarily concerned with capturing abnormal events, with the help of catch han...
Cristian Gherghina, Cristina David
ECAI
2010
Springer
14 years 11 months ago
LTL Goal Specifications Revisited
The language of linear temporal logic (LTL) has been proposed as a formalism for specifying temporally extended goals and search control constraints in planning. However, the seman...
Andreas Bauer 0002, Patrik Haslum
111
Voted
EMSOFT
2010
Springer
14 years 11 months ago
PinaVM: a systemC front-end based on an executable intermediate representation
SystemC is the de facto standard for modeling embedded systems. It allows system design at various levels of abstractions, provides typical object-orientation features and incorpo...
Kevin Marquet, Matthieu Moy
LPAR
2010
Springer
14 years 11 months ago
Verifying Pointer and String Analyses with Region Type Systems
Pointer analysis statically approximates the heap pointer structure during a program execution in order to track heap objects or to establish alias relations between references, a...
Lennart Beringer, Robert Grabowski, Martin Hofmann