Sciweavers

1109 search results - page 157 / 222
» Software verification for TinyOS
Sort
View
POPL
2004
ACM
15 years 10 months ago
Separation and information hiding
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resource...
Peter W. O'Hearn, Hongseok Yang, John C. Reynolds
CADE
2007
Springer
15 years 10 months ago
A Termination Checker for Isabelle Hoare Logic
Abstract. Hoare logic is widely used for software specification and verification. Frequently we need to prove the total correctness of a program: to prove that the program not only...
Jia Meng, Lawrence C. Paulson, Gerwin Klein
CADE
2006
Springer
15 years 10 months ago
Tree Automata with Equality Constraints Modulo Equational Theories
This paper presents new classes of tree automata combining automata with equality test and automata modulo equational theories. We believe that these classes have a good potential ...
Florent Jacquemard, Laurent Vigneron, Michaël...
DATE
2008
IEEE
167views Hardware» more  DATE 2008»
15 years 4 months ago
Accuracy-Adaptive Simulation of Transaction Level Models
Simulation of transaction level models (TLMs) is an established embedded systems design technique. Its use cases include virtual prototyping for early software development, platfo...
Martin Radetzki, Rauf Salimi Khaligh
DSN
2007
IEEE
15 years 4 months ago
Assurance Based Development of Critical Systems
  Assurance Based Development (ABD) is the synergistic construction of a critical computing system and an  assurance  case  that  sets  out  the  dependabilit...
Patrick J. Graydon, John C. Knight, Elisabeth A. S...