Sciweavers

933 search results - page 98 / 187
» Extending Forward Checking
Sort
View
105
Voted
ICDCS
2007
IEEE
15 years 7 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
121
Voted
ECOOP
2007
Springer
15 years 7 months ago
Morphing: Safely Shaping a Class in the Image of Others
We present MJ: a language for specifying general classes whose members are produced by iterating over members of other classes. We call this technique “class morphing” or just ...
Shan Shan Huang, David Zook, Yannis Smaragdakis
117
Voted
TACAS
2007
Springer
108views Algorithms» more  TACAS 2007»
15 years 7 months ago
State of the Union: Type Inference Via Craig Interpolation
The ad-hoc use of unions to encode disjoint sum types in C programs and the inability of C’s type system to check the safe use of these unions is a long standing source of subtle...
Ranjit Jhala, Rupak Majumdar, Ru-Gang Xu
APSEC
2005
IEEE
15 years 6 months ago
Monitoring with Behavior View Diagrams for Debugging
UML sequence diagrams are widely used during requirements analysis and design for specifying the expected message exchanges among a set of objects in various scenarios for the pro...
Donglin Liang, Kai Xu 0002
SAS
2005
Springer
134views Formal Methods» more  SAS 2005»
15 years 6 months ago
Using Dependent Types to Certify the Safety of Assembly Code
There are many source-level analyses or instrumentation tools that enforce various safety properties. In this paper we present an infrastructure that can be used to check independe...
Matthew Harren, George C. Necula