Sciweavers

2520 search results - page 95 / 504
» Model-checking behavioral programs
Sort
View
87
Voted
EMSOFT
2009
Springer
15 years 7 months ago
Probabilistic modeling of data cache behavior
In this paper, we propose a formal analysis approach to estimate the expected (average) data cache access time of an application across all possible program inputs. Towards this g...
Vinayak Puranik, Tulika Mitra, Y. N. Srikant
90
Voted
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 1 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
121
Voted
ESOP
2008
Springer
15 years 2 months ago
Cover Algorithms and Their Combination
This paper defines the cover of a formula with respect to a set of variables V in theory T to be the strongest quantifier-free formula that is implied by V : in theory T. Cover e...
Sumit Gulwani, Madan Musuvathi
212
Voted
PLDI
2009
ACM
16 years 1 months ago
A decision procedure for subset constraints over regular languages
Reasoning about string variables, in particular program inputs, is an important aspect of many program analyses and testing frameworks. Program inputs invariably arrive as strings...
Pieter Hooimeijer, Westley Weimer
CAV
2008
Springer
108views Hardware» more  CAV 2008»
15 years 2 months ago
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis
This paper addresses the analysis of concurrent programs with shared memory. Such an analysis is undecidable in the presence of multiple procedures. One approach used in recent wor...
Akash Lal, Thomas W. Reps