Sciweavers

890 search results - page 120 / 178
» Programming language methods in computer security
Sort
View
114
Voted
ISMB
1994
15 years 1 months ago
Genetic Map Construction with Constraints
Apilot program,CME,is describedfor generatinga physical genetic mapfromhybridization fingerprintingdata. CMEis implementedin the parallel constraint logic programming language Eli...
Dominic A. Clark, Christopher J. Rawlings, Sylvie ...
POPL
2002
ACM
16 years 27 days ago
Predicate abstraction for software verification
e Abstraction for Software Verification Cormac Flanagan Shaz Qadeer Compaq Systems Research Center 130 Lytton Ave, Palo Alto, CA 94301 Software verification is an important and di...
Cormac Flanagan, Shaz Qadeer
115
Voted
PLDI
2010
ACM
15 years 10 months ago
Breadcrumbs: Efficient Context Sensitivity for Dynamic Bug Detection Analyses
Calling context--the set of active methods on the stack--is critical for understanding the dynamic behavior of large programs. Dynamic program analysis tools, however, are almost ...
Michael D. Bond, Graham Z. Baker, Samuel Z. Guyer
CPHYSICS
2008
96views more  CPHYSICS 2008»
15 years 20 days ago
Moment distributions of clusters and molecules in the adiabatic rotor model
We present a Fortran program to compute the distribution of dipole moments of free particles for use in analyzing molecular beams experiments that measure moments by deflection in...
G. E. Ballentine, G. F. Bertsch, N. Onishi, K. Yab...
PPDP
2010
Springer
14 years 10 months ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch