Sciweavers

933 search results - page 64 / 187
» Extending Forward Checking
Sort
View
92
Voted
FAC
2008
139views more  FAC 2008»
15 years 23 days ago
Network invariants for real-time systems
We extend the approach of model checking parameterized networks of processes by means of network invariants to the setting of real-time systems. We introduce timed transition stru...
Olga Grinchtein, Martin Leucker
104
Voted
ICISS
2010
Springer
14 years 10 months ago
Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems
Existing proposals for end-to-end independently-verifiable (E2E) voting systems require that voters check the presence of a "receipt" on a secure bulletin board. The tall...
Mridul Nandi, Stefan Popoveniuc, Poorvi L. Vora
146
Voted
ISCA
2012
IEEE
248views Hardware» more  ISCA 2012»
13 years 3 months ago
Watchdog: Hardware for safe and secure manual memory management and full memory safety
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
Santosh Nagarakatte, Milo M. K. Martin, Steve Zdan...
104
Voted
CC
2008
Springer
111views System Software» more  CC 2008»
15 years 2 months ago
Java Bytecode Verification for @NonNull Types
Java's annotation mechanism allows us to extend its type system with non-null types. However, checking such types cannot be done using the existing bytecode verification algor...
Chris Male, David J. Pearce, Alex Potanin, Constan...
115
Voted
TVCG
2012
186views Hardware» more  TVCG 2012»
13 years 3 months ago
Topology Verification for Isosurface Extraction
—The broad goals of verifiable visualization rely on correct algorithmic implementations. We extend a framework for verification of isosurfacing implementations to check topologi...
Tiago Etiene, Luis Gustavo Nonato, Carlos Eduardo ...