Sciweavers

1304 search results - page 190 / 261
» Model Checking C Programs Using F-SOFT
Sort
View
114
Voted
ESWA
2006
86views more  ESWA 2006»
15 years 3 months ago
Modeling consumer acceptance probabilities
This paper investigates how to estimate the likelihood of a customer accepting a loan offer as a function of the offer parameters and how to choose the optimal set of parameters f...
L. C. Thomas, Ki Mun Jung, Steve D. Thomas, Y. Wu
115
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
133
Voted
TACAS
2005
Springer
124views Algorithms» more  TACAS 2005»
15 years 9 months ago
Localization and Register Sharing for Predicate Abstraction
ion Himanshu Jain1,2 , Franjo Ivanˇci´c1 , Aarti Gupta1 , and Malay K. Ganai1 1 NEC Laboratories America, Inc., 4 Independence Way, Princeton, NJ 08540 2 School of Computer Scien...
Himanshu Jain, Franjo Ivancic, Aarti Gupta, Malay ...
111
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Permissive interfaces
A modular program analysis considers components independently and provides succinct summaries for each component, which can be used when checking the rest of the system. Consider ...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar
159
Voted
IWMM
2011
Springer
254views Hardware» more  IWMM 2011»
14 years 6 months ago
Short-term memory for self-collecting mutators
We propose a new memory model called short-term memory for managing objects on the heap. In contrast to the traditional persistent memory model for heap management, objects in sho...
Martin Aigner, Andreas Haas, Christoph M. Kirsch, ...