Sciweavers

2673 search results - page 160 / 535
» Guided Static Analysis
Sort
View
SCAM
2008
IEEE
15 years 10 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
WICON
2008
15 years 5 months ago
What is optimal scheduling in wireless networks?
We consider a wireless network consisting of multiple transmitters with multicast traffic destined for a set of receivers. We are interested in the problem of joint scheduling and...
Anna Pantelidou, Anthony Ephremides
TCAD
2008
181views more  TCAD 2008»
15 years 4 months ago
A Survey of Automated Techniques for Formal Software Verification
The quality and the correctness of software is often the greatest concern in electronic systems. Formal verification tools can provide a guarantee that a design is free of specific...
Vijay D'Silva, Daniel Kroening, Georg Weissenbache...
ENTCS
2010
133views more  ENTCS 2010»
14 years 11 months ago
Inference of Session Types From Control Flow
This is a study of a technique for deriving the session type of a program written in a statically typed imperative language from its control flow. We impose on our unlabelled sess...
Peter Collingbourne, Paul H. J. Kelly
CEJCS
2011
78views more  CEJCS 2011»
14 years 4 months ago
Good versus optimal: Why network analytic methods need more systematic evaluation
: Network analytic method designed for the analysis of static networks promise to identify significant relational patterns that correlate with important structures in the complex ...
Katharina Anna Zweig