Sciweavers

637 search results - page 17 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
UML
2004
Springer
15 years 2 months ago
Determining the Structural Events That May Violate an Integrity Constraint
Any implementation of an information system must ensure that an operation is only applied if its execution does not lead to a violation of any of the integrity constraints defined ...
Jordi Cabot, Ernest Teniente
CAV
2001
Springer
119views Hardware» more  CAV 2001»
15 years 1 months ago
Certifying Model Checkers
Model Checking is an algorithmic technique to determine whether a temporal property holds of a program. For linear time properties, a model checker produces a counterexample comput...
Kedar S. Namjoshi
ICCAD
1998
IEEE
66views Hardware» more  ICCAD 1998»
15 years 1 months ago
Tight integration of combinational verification methods
Combinational verification is an important piece of most equivalence checking tools. In the recent past, many combinational verification algorithms have appeared in the literature...
Jerry R. Burch, Vigyan Singhal
AINA
2007
IEEE
15 years 3 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 7 months ago
MiniAgda: Integrating Sized and Dependent Types
Sized types are a modular and theoretically well-understood tool for checking termination of recursive and productivity of corecursive definitions. The essential idea is to track ...
Andreas Abel