Sciweavers

322 search results - page 43 / 65
» Developing and Reasoning About Probabilistic Programs in pGC...
Sort
View
PLDI
2009
ACM
15 years 4 months ago
Language-based security on Android
In this paper, we initiate a formal study of security on Android: Google’s new open-source platform for mobile devices. Specifically, we present a core typed language to descri...
Avik Chaudhuri
61
Voted
LPAR
2007
Springer
15 years 3 months ago
Why Would You Trust B ?
Abstract. The use of formal methods provides confidence in the correctness of developments. Yet one may argue about the actual level of confidence obtained when the method itself...
Éric Jaeger, Catherine Dubois
AADEBUG
2005
Springer
15 years 3 months ago
Automated bug isolation via program chipping
This paper introduces program chipping, a simple yet effective technique to isolate bugs. This technique automatically removes or chips away parts of a program so that the part t...
Chad D. Sterling, Ronald A. Olsson
PODS
2005
ACM
136views Database» more  PODS 2005»
15 years 9 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
68
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
On Optimal Sizing of Tiered Network Services
Abstract— We develop an economic model for networks offering tiered services and we formulate the problem of selecting the service tiers from three perspectives: one that conside...
Qian Lv, George N. Rouskas