Sciweavers

3820 search results - page 405 / 764
» Bounded Model Debugging
Sort
View
POPL
2007
ACM
16 years 4 months ago
Assessing security threats of looping constructs
There is a clear intuitive connection between the notion of leakage of information in a program and concepts from information theory. This intuition has not been satisfactorily pi...
Pasquale Malacaria
ATVA
2009
Springer
158views Hardware» more  ATVA 2009»
15 years 10 months ago
Logahedra: A New Weakly Relational Domain
Weakly relational numeric domains express restricted classes of linear inequalities that strike a balance between what can be described and what can be efficiently computed. Popula...
Jacob M. Howe, Andy King
134
Voted
CISS
2008
IEEE
15 years 10 months ago
Short-term fairness and long-term QoS
—We consider connection-level models of resource allocation in the Internet, where files arrive into the network according to a Poisson process and the size of each file is exp...
Bo Tan, Lei Ying, R. Srikant
TPHOL
2008
IEEE
15 years 10 months ago
Formal Reasoning About Causality Analysis
Systems that can immediately react to their inputs may suffer from cyclic dependencies between their actions and the corresponding trigger conditions. For this reason, causality an...
Jens Brandt, Klaus Schneider
ICC
2007
IEEE
15 years 10 months ago
Large System Performance Evaluation of the DS/CDMA Relay Channel Using Linear Receivers
— This paper considers a relay communication system where cooperative diversity is achieved by spreading the relay transmissions using direct-sequence CDMA (DS/CDMA). We derive e...
David Gregoratti, Xavier Mestre