Sciweavers

219 search results - page 34 / 44
» Assume-Guarantee Model Checking of Software: A Comparative C...
Sort
View
ISSTA
2010
ACM
14 years 11 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
ICTAC
2010
Springer
14 years 8 months ago
Preference and Non-deterministic Choice
Material Flow Abstraction of Manufacturing Systems. ‣Umberto Costa, Ivan de Medeiros Jr and Marcel Oliveira. Specification and Verification of a MPI Implementation for a MP-SoC...
Bill Stoddart, Frank Zeyda, Steve Dunne
68
Voted
SIGSOFT
2006
ACM
15 years 10 months ago
Local analysis of atomicity sphere for B2B collaboration
Atomicity is a desirable property for business processes to conduct transactions in Business-to-Business (B2B) collaboration. Although it is possible to reason about atomicity of ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu
SCAM
2007
IEEE
15 years 3 months ago
On Temporal Path Conditions in Dependence Graphs
Program dependence graphs are a well-established device to represent possible information flow in a program. Path conditions in dependence graphs have been proposed to express mo...
Andreas Lochbihler, Gregor Snelting
TOOLS
1999
IEEE
15 years 1 months ago
Automatic Detection of Design Problems in Object-Oriented Reengineering
The evolution of software systems over many years often leads to unnecessarily complex and in exible designs which in turn lead to a huge amount of e ort for enhancements and main...
Oliver Ciupke