Sciweavers

3909 search results - page 268 / 782
» Extreme Model Checking
Sort
View
CCA
2009
Springer
15 years 10 months ago
Relativizations of the P =? DNP Question for the BSS Model
We consider the uniform BSS model of computation where the machines can perform additions, multiplications, and tests of the form x ≥ 0. The oracle machines can also check whethe...
Christine Gaßner
JCS
2002
94views more  JCS 2002»
15 years 3 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
142
Voted
VMCAI
2009
Springer
15 years 10 months ago
An Abort-Aware Model of Transactional Programming
There has been a lot of recent research on transaction-based concurrent programming, aimed at offering an easier concurrent programming paradigm that enables programmers to better...
Kousha Etessami, Patrice Godefroid
APCCM
2006
15 years 4 months ago
ServiceMosaic project: modeling, analysis and management of web services interactions
This paper provides an overview of ServiceMosaic, which is a platform for model-driven analysis and management of service interactions. In particular, in this paper, we focus on b...
Boualem Benatallah, Hamid R. Motahari Nezhad
117
Voted
JFP
2006
78views more  JFP 2006»
15 years 3 months ago
Sound and complete models of contracts
Even in statically typed languages it is useful to have certain invariants checked dynamically. Findler and Felleisen gave an algorithm for dynamically checking expressive highero...
Matthias Blume, David A. McAllester