Sciweavers

452 search results - page 43 / 91
» Symbolic Execution of Behavioral Requirements
Sort
View
CLUSTER
2002
IEEE
15 years 18 days ago
Location Selection for Active Services
Active services are application-specified programs that are executed inside the network. The location where the active service is executed plays an important role. The dynamic beha...
Roger Karrer, Thomas R. Gross
94
Voted
ICSE
2005
IEEE-ACM
16 years 26 days ago
Static analysis tools as early indicators of pre-release defect density
During software development it is helpful to obtain early estimates of the defect density of software components. Such estimates identify fault-prone areas of code requiring furth...
Nachiappan Nagappan, Thomas Ball
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 6 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
ISPAN
2002
IEEE
15 years 5 months ago
Automatic Processor Lower Bound Formulas for Array Computations
In the directed acyclic graph (dag) model of algorithms, consider the following problem for precedence-constrained multiprocessor schedules for array computations: Given a sequenc...
Peter R. Cappello, Ömer Egecioglu
114
Voted
BIRTHDAY
2006
Springer
15 years 4 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle