Sciweavers

1499 search results - page 171 / 300
» Chopping Concurrent Programs
Sort
View
116
Voted
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 7 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
92
Voted
APLAS
2004
ACM
15 years 6 months ago
Protocol Specialization
Abstract. In component-based programming, the programmer assembles applications from prefabricated components. The assembly process has two main steps: adapting a component by twea...
Matthias Neubauer, Peter Thiemann
113
Voted
ICLP
2004
Springer
15 years 6 months ago
Protein Folding Simulation in CCP
A protein is identified by a finite sequence of aminoacids, each of them chosen from a set of 20 elements. The Protein Structure Prediction Problem is the problem of predicting t...
Alessandro Dal Palù, Agostino Dovier, Feder...
120
Voted
FM
2006
Springer
133views Formal Methods» more  FM 2006»
15 years 4 months ago
Enforcer - Efficient Failure Injection
Non-determinism of the thread schedule is a well-known problem in concurrent programming. However, other sources of non-determinism exist which cannot be controlled by an applicati...
Cyrille Artho, Armin Biere, Shinichi Honiden
108
Voted
ISOLA
2010
Springer
14 years 11 months ago
WOMM: A Weak Operational Memory Model
Abstract. Memory models of shared memory concurrent programs define the values a read of a shared memory location is allowed to see. Such memory models are typically weaker than t...
Arnab De, Abhik Roychoudhury, Deepak D'Souza