Sciweavers

1379 search results - page 142 / 276
» Dynamic Program Slicing in Understanding of Program Executio...
Sort
View
TACAS
2009
Springer
127views Algorithms» more  TACAS 2009»
15 years 10 months ago
From Tests to Proofs
We describe the design and implementation of an automatic invariant generator for imperative programs. While automatic invariant generation through constraint solving has been exte...
Ashutosh Gupta, Rupak Majumdar, Andrey Rybalchenko
115
Voted
FM
2003
Springer
108views Formal Methods» more  FM 2003»
15 years 8 months ago
Correctness of Source-Level Safety Policies
Abstract. Program certification techniques formally show that programs satisfy certain safety policies. They rely on the correctness of the safety policy which has to be establish...
Ewen Denney, Bernd Fischer 0002
CONCURRENCY
1998
139views more  CONCURRENCY 1998»
15 years 3 months ago
Applications experience in Jade
This paper presents our experience developing applications in Jade, a portable, implicitly parallel programming language designed for exploiting task-level concurrency. Jade progr...
Martin C. Rinard
ISCA
2012
IEEE
208views Hardware» more  ISCA 2012»
13 years 5 months ago
Harmony: Collection and analysis of parallel block vectors
Efficient execution of well-parallelized applications is central to performance in the multicore era. Program analysis tools support the hardware and software sides of this effor...
Melanie Kambadur, Kui Tang, Martha A. Kim
176
Voted
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 5 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...