Sciweavers

5255 search results - page 323 / 1051
» Formal Methods for Privacy
Sort
View
ISOLA
2010
Springer
15 years 2 months ago
Task Forces in the EternalS Coordination Action
We describe the scope, organization, and expected outcomes of the Task Forces of the EternalS Coordination Action. The goal of the Task Forces is to provide structure and focus to ...
Reiner Hähnle
SAS
2010
Springer
175views Formal Methods» more  SAS 2010»
15 years 2 months ago
Thread-Modular Counterexample-Guided Abstraction Refinement
ion Refinement Alexander Malkis1 , Andreas Podelski2 , and Andrey Rybalchenko3 1 IMDEA Software 2 University of Freiburg 3 TU M
Alexander Malkis, Andreas Podelski, Andrey Rybalch...
SBMF
2010
Springer
149views Formal Methods» more  SBMF 2010»
14 years 11 months ago
Reasoning about Assignments in Recursive Data Structures
This paper presents a framework to reason about the eects of assignments in recursive data structures. We dene an operational semantics for a core language based on Meyer's id...
Alejandro Tamalet, Ken Madlener
SAS
2012
Springer
226views Formal Methods» more  SAS 2012»
13 years 7 months ago
A Structural Soundness Proof for Shivers's Escape Technique - A Case for Galois Connections
Abstract. Shivers’s escape technique enables one to analyse the control flow of higher-order program fragments. It is widely used, but its soundness has never been proven. In th...
Jan Midtgaard, Michael D. Adams 0001, Matthew Migh...
141
Voted
MOBIHOC
2009
ACM
16 years 5 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao