Sciweavers

1128 search results - page 139 / 226
» Little Engines of Proof
Sort
View
111
Voted
ICFEM
2009
Springer
15 years 7 months ago
Circular Coinduction with Special Contexts
Coinductive proofs of behavioral equivalence often require human ingenuity, in that one is expected to provide a “good” relation extending one’s goal with additional lemmas, ...
Dorel Lucanu, Grigore Rosu
97
Voted
UIST
2009
ACM
15 years 7 months ago
Abracadabra: wireless, high-precision, and unpowered finger input for very small mobile devices
We present Abracadabra, a magnetically driven input technique that offers users wireless, unpowered, high fidelity finger input for mobile devices with very small screens. By exte...
Chris Harrison, Scott E. Hudson
113
Voted
APSEC
2008
IEEE
15 years 7 months ago
A Heap Model for Java Bytecode to Support Separation Logic
Memory usage analysis is an important problem for resource-constrained mobile devices, especially under mission- or safety-critical circumstances. Program codes running on or bein...
Chenguang Luo, Guanhua He, Shengchao Qin
105
Voted
APSEC
2008
IEEE
15 years 7 months ago
Test Case Prioritization Based on Analysis of Program Structure
Test case prioritization techniques have been empirically proved to be effective in improving the rate of fault detection in regression testing. However, most of previous techniqu...
Zengkai Ma, Jianjun Zhao
102
Voted
SADFE
2008
IEEE
15 years 7 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....