Sciweavers

733 search results - page 124 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
ADBIS
2005
Springer
147views Database» more  ADBIS 2005»
15 years 5 months ago
Declarative Data Fusion - Syntax, Semantics, and Implementation
In today’s integrating information systems data fusion, i.e., the merging of multiple tuples about the same real-world object into a single tuple, is left to ETL tools and other ...
Jens Bleiholder, Felix Naumann
PLDI
2004
ACM
15 years 5 months ago
KISS: keep it simple and sequential
The design of concurrent programs is error-prone due to the interaction between concurrently executing threads. Traditional automated techniques for finding errors in concurrent ...
Shaz Qadeer, Dinghao Wu
OOPSLA
2010
Springer
14 years 9 months ago
Composable specifications for structured shared-memory communication
In this paper we propose a communication-centric approach to specifying and checking how multithreaded programs use shared memory to perform inter-thread communication. Our approa...
Benjamin P. Wood, Adrian Sampson, Luis Ceze, Dan G...
ISESE
2006
IEEE
15 years 5 months ago
An industrial case study of structural testing applied to safety-critical embedded software
Effective testing of safety-critical real-time embedded software is difficult and expensive. Many companies are hesitant about the cost of formalized criteria-based testing and a...
Jing Guan, Jeff Offutt, Paul Ammann
ICFP
2009
ACM
16 years 12 days ago
Effective interactive proofs for higher-order imperative programs
We present a new approach for constructing and verifying higherorder, imperative programs using the Coq proof assistant. We build on the past work on the Ynot system, which is bas...
Adam J. Chlipala, J. Gregory Malecha, Greg Morrise...