Sciweavers

337 search results - page 53 / 68
» Predicate abstraction for software verification
Sort
View
ISSTA
2000
ACM
15 years 4 months ago
Verifying properties of process definitions
ions for concise and precise specification of such control, but balance this with visualization support to help users also obtain intuitive insights. The underlying complexhese con...
Jamieson M. Cobleigh, Lori A. Clarke, Leon J. Oste...
88
Voted
CORR
2010
Springer
111views Education» more  CORR 2010»
15 years 16 days ago
Reducing the Number of Annotations in a Verification-oriented Imperative Language
Abstract. Automated software verification is a very active field of research which has made enormous progress both in theoretical and practical aspects. Recently, an important amou...
Guido de Caso, Diego Garbervetsky, Daniel Gor&iacu...
100
Voted
CCS
2009
ACM
16 years 1 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
SIGSOFT
2007
ACM
16 years 1 months ago
Differential testing: a new approach to change detection
Regression testing, as it's commonly practiced, is unsound due to inconsistent test repair and test addition. This paper presents a new technique, differential testing, that ...
Robert B. Evans, Alberto Savoia
104
Voted
RE
2004
Springer
15 years 5 months ago
From Aspectual Requirements to Proof Obligations for Aspect-Oriented Systems
Aspect-oriented software development (AOSD) techniques support systematic modularization and composition of crosscutting concerns. Though AOSD techniques have been proposed to han...
Shmuel Katz, Awais Rashid