Sciweavers

499 search results - page 58 / 100
» LTL satisfiability checking
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 11 days ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
FTDCS
1997
IEEE
15 years 4 months ago
Analysing the behaviour of distributed software architectures: a case study
A Software Architecture is the overall structure of a system in terms of its constituent components and their interconnections. In this paper, we describe work to associate behavi...
Jeff Magee, Jeff Kramer, Dimitra Giannakopoulou
ECAI
2008
Springer
15 years 1 months ago
Justification-Based Non-Clausal Local Search for SAT
While stochastic local search (SLS) techniques are very efficient in solving hard randomly generated propositional satisfiability (SAT) problem instances, a major challenge is to i...
Matti Järvisalo, Tommi A. Junttila, Ilkka Nie...
GVD
2004
142views Database» more  GVD 2004»
15 years 1 months ago
Semantic Errors in SQL Queries: A Quite Complete List
We investigate classes of SQL queries which are syntactically correct, but certainly not intended, no matter for which task the query was written. For instance, queries that are c...
Christian Goldberg, Stefan Brass
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
15 years 1 days ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki