Sciweavers

135 search results - page 8 / 27
» Structure-aware computation of predicate abstraction
Sort
View
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 1 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
83
Voted
CAV
2005
Springer
122views Hardware» more  CAV 2005»
15 years 3 months ago
Interpolant-Based Transition Relation Approximation
Abstract. In predicate abstraction, exact image computation is problematic, requiring in the worst case an exponential number of calls to a decision procedure. For this reason, sof...
Ranjit Jhala, Kenneth L. McMillan
SPIN
2001
Springer
15 years 2 months ago
Automatically Validating Temporal Safety Properties of Interfaces
Abstract. We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property...
Thomas Ball, Sriram K. Rajamani
ACTA
1998
81views more  ACTA 1998»
14 years 9 months ago
Dijkstra-Scholten Predicate Calculus: Concepts and Misconceptions
The paper focusses on the logical backgrounds of the Dijkstra-Scholten program development style for correct programs. For proving the correctness of a program (i.e. the fact that...
Lex Bijlsma, Rob Nederpelt
LOPSTR
2005
Springer
15 years 3 months ago
Non-leftmost Unfolding in Partial Evaluation of Logic Programs with Impure Predicates
Partial evaluation of logic programs which contain impure predicates poses non-trivial challenges. Impure predicates include those which produce side-effects, raise errors (or exc...
Elvira Albert, Germán Puebla, John P. Galla...