Sciweavers

1941 search results - page 225 / 389
» Reasoning about Computations Using Two-Levels of Logic
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
14 years 7 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
ATVA
2007
Springer
162views Hardware» more  ATVA 2007»
15 years 10 months ago
Verifying Heap-Manipulating Programs in an SMT Framework
Automated software verification has made great progress recently, and a key enabler of this progress has been the advances in efficient, automated decision procedures suitable fo...
Zvonimir Rakamaric, Roberto Bruttomesso, Alan J. H...
131
Voted
SAS
1993
Springer
104views Formal Methods» more  SAS 1993»
15 years 8 months ago
Strictness Properties of Lazy Algebraic Datatypes
A new construction of a finite set of strictness properties for any lazy algebraic datatype is presented. The construction is based on the categorical view of the solutions to the...
P. N. Benton
SIGSOFT
2010
ACM
15 years 1 months ago
Phantm: PHP analyzer for type mismatch
We present Phantm, a static analyzer that uses a flowsensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runti...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
SAC
2010
ACM
15 years 10 months ago
Dual analysis for proving safety and finding bugs
Program bugs remain a major challenge for software developers and various tools have been proposed to help with their localization and elimination. Most present-day tools are base...
Corneliu Popeea, Wei-Ngan Chin