Sciweavers

2291 search results - page 210 / 459
» Representational Reasoning and Verification
Sort
View
133
Voted
CVPR
2011
IEEE
14 years 9 months ago
A Segmentation-aware Object Detection Model with Occlusion Handling
The bounding box representation employed by many popular object detection models [3, 6] implicitly assumes all pixels inside the box belong to the object. This assumption makes th...
Tianshi Gao, Benjamin Packer, Daphne Koller
207
Voted
POPL
2008
ACM
16 years 1 months ago
Cyclic proofs of program termination in separation logic
We propose a novel approach to proving the termination of heapmanipulating programs, which combines separation logic with cyclic proof within a Hoare-style proof system. Judgement...
James Brotherston, Richard Bornat, Cristiano Calca...
102
Voted
ICSE
2005
IEEE-ACM
16 years 27 days ago
Verifying safety policies with size properties and alias controls
Many software properties can be analysed through a relational size analysis on each function's inputs and outputs. Such relational analysis (through a form of dependent typin...
Wei-Ngan Chin, Siau-Cheng Khoo, Shengchao Qin, Cor...
104
Voted
POPL
2010
ACM
15 years 10 months ago
Dependent Types from Counterexamples
d by recent research in abstract model checking, we present a new approach to inferring dependent types. Unlike many of the existing approaches, our approach does not rely on prog...
Tachio Terauchi
117
Voted
EMSOFT
2006
Springer
15 years 4 months ago
Analysis of the zeroconf protocol using UPPAAL
We report on a case study in which the model checker Uppaal is used to formally model parts of Zeroconf, a protocol for dynamic configuration of IPv4 link-local addresses that has...
Biniam Gebremichael, Frits W. Vaandrager, Miaomiao...