Sciweavers

2482 search results - page 246 / 497
» Characterizing Programming Systems Allowing Program Self-ref...
Sort
View
134
Voted
CSFW
2007
IEEE
15 years 9 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
116
Voted
ICTAC
2004
Springer
15 years 8 months ago
A Proof of Weak Termination Providing the Right Way to Terminate
We give an inductive method for proving weak innermost termination of rule-based programs, from which we automatically infer, for each successful proof, a finite strategy for data...
Olivier Fissore, Isabelle Gnaedig, Hél&egra...
ICFEM
2004
Springer
15 years 8 months ago
A Formal Monitoring-Based Framework for Software Development and Analysis
A formal framework for software development and analysis is presented, which aims at reducing the gap between formal specification and implementation by integrating the two and al...
Feng Chen, Marcelo d'Amorim, Grigore Rosu
122
Voted
VMCAI
2004
Springer
15 years 8 months ago
Boolean Algebra of Shape Analysis Constraints
Shape analysis is a promising technique for statically verifying and extracting properties of programs that manipulate complex data structures. We introduce a new characterization...
Viktor Kuncak, Martin C. Rinard
110
Voted
BMCBI
2007
100views more  BMCBI 2007»
15 years 2 months ago
SBMLeditor: effective creation of models in the Systems Biology Markup Language (SBML)
Background: The need to build a tool to facilitate the quick creation and editing of models encoded in the Systems Biology Markup language (SBML) has been growing with the number ...
Nicolas Rodriguez, Marco Donizelli, Nicolas Le Nov...