Sciweavers

837 search results - page 89 / 168
» Proof Development with OMEGA
Sort
View
92
Voted
FASE
2009
Springer
15 years 7 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
ICECCS
2009
IEEE
106views Hardware» more  ICECCS 2009»
15 years 7 months ago
Visual Comparison of Graphical Models
Collaborative development, incremental design and revision management require the ability to compare different versions of software artifacts. There are well-established approache...
Arne Schipper, Hauke Fuhrmann, Reinhard von Hanxle...
77
Voted
ICRA
2009
IEEE
174views Robotics» more  ICRA 2009»
15 years 7 months ago
Cardiolock2: Parallel singularities for the design of an active heart stabilizer
— In this paper, the design of a new active cardiac stabilizer, Cardiolock2, is presented. Following the proof of concept Cardiolock [7], this device allows an active stabilizati...
Wael Bachta, Pierre Renaud, Edouard Laroche, Jacqu...
104
Voted
CIE
2009
Springer
15 years 7 months ago
Computable Exchangeable Sequences Have Computable de Finetti Measures
Abstract. We prove a uniformly computable version of de Finetti’s theorem on exchangeable sequences of real random variables. In the process, we develop machinery for computably ...
Cameron E. Freer, Daniel M. Roy
81
Voted
CSL
2009
Springer
15 years 7 months ago
On the Relation between Sized-Types Based Termination and Semantic Labelling
We investigate the relationship between two independently developed termination techniques for rst and higher-order rewrite systems. On the one hand, sized-types based termination...
Frédéric Blanqui, Cody Roux