Sciweavers

570 search results - page 54 / 114
» From Program Verification to Program Synthesis
Sort
View
126
Voted
CCS
2006
ACM
15 years 6 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
ACMSE
2004
ACM
15 years 8 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
CDC
2009
IEEE
138views Control Systems» more  CDC 2009»
15 years 7 months ago
Synthesis of a global asymptotic stabilizing feedback law for a system satisfying two different sector conditions
— Global asymptotic stabilization for a class of nonlinear systems is addressed. The dynamics of these systems are composed of a linear part to which is added some nonlinearities...
Vincent Andrieu, Christophe Prieur, Sophie Tarbour...
114
Voted
VLSID
1994
IEEE
124views VLSI» more  VLSID 1994»
15 years 6 months ago
ILP-Based Scheduling with Time and Resource Constraints in High Level Synthesis
In this paper, we present a formal analysis of the constraints of the scheduling problem, and evaluate the structure of the scheduling polytope described by those constraints. Pol...
Samit Chaudhuri, Robert A. Walker
223
Voted
POPL
2009
ACM
16 years 3 months ago
The theory of deadlock avoidance via discrete control
Deadlock in multithreaded programs is an increasingly important problem as ubiquitous multicore architectures force parallelization upon an ever wider range of software. This pape...
Manjunath Kudlur, Scott A. Mahlke, Stéphane...