Sciweavers

1541 search results - page 131 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
PLDI
2006
ACM
15 years 10 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
GIS
2011
ACM
14 years 7 months ago
Embedding rivers in triangulated irregular networks with linear programming
Data conflation is a major issue in GIS: different geospatial data sets covering overlapping regions, possibly obtained from different sources and using different acquisition ...
Marc J. van Kreveld, Rodrigo I. Silveira
SIGSOFT
2007
ACM
16 years 5 months ago
Programming asynchronous layers with CLARITY
Asynchronous systems components are hard to write, hard to reason about, and (not coincidentally) hard to mechanically verify. In order to achieve high performance, asynchronous c...
Prakash Chandrasekaran, Christopher L. Conway, Jos...
POPL
2012
ACM
13 years 12 months ago
Playing in the grey area of proofs
Interpolation is an important technique in verification and static analysis of programs. In particular, interpolants extracted from proofs of various properties are used in invar...
Krystof Hoder, Laura Kovács, Andrei Voronko...
WSC
2004
15 years 5 months ago
Multi-Formalism Modeling Approach for Semiconductor Supply/Demand Networks
Building computational models of real world systems usually requires the interaction of decision modules and simulation modules. Given different models and algorithms, the major h...
Gary W. Godding, Hessam S. Sarjoughian, Karl G. Ke...