Sciweavers

1304 search results - page 129 / 261
» Model Checking C Programs Using F-SOFT
Sort
View
CSFW
1998
IEEE
15 years 7 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
FMCAD
2004
Springer
15 years 8 months ago
Proof Styles in Operational Semantics
Abstract. We relate two well-studied methodologies in deductive verification of operationally modeled sequential programs, namely the use of inductive invariants and clock functio...
Sandip Ray, J. Strother Moore
ICASSP
2009
IEEE
15 years 10 months ago
Exploiting statically schedulable regions in dataflow programs
Dataflow descriptions have been used in a wide range of Digital Signal Processing (DSP) applications, such as multi-media processing, and wireless communications. Among various f...
Ruirui Gu, Jörn W. Janneck, Mickaël Raul...
FASE
2009
Springer
15 years 7 months ago
Enhanced Property Specification and Verification in BLAST
Model checking tools based on the iterative refinement of predicate abstraction (e.g., Slam and Blast) often feature a specification language for expressing complex behavior rules....
Ondrej Sery
SAC
2008
ACM
15 years 2 months ago
UML-based design test generation
In this paper we investigate and propose a fully automated technique to perform conformance checking of Java implementations against UML class diagrams. In our approach, we reused...
Waldemar Pires, João Brunet, Franklin Ramal...