Sciweavers

1541 search results - page 141 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
SIGSOFT
2003
ACM
16 years 5 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
WSC
2000
15 years 5 months ago
Parallel execution of a sequential network simulator
Parallel discrete event simulation (PDES) techniques have not yet made a substantial impact on the network simulation community because of the need to recast the simulation models...
Kevin G. Jones, Samir Ranjan Das
ESOP
2008
Springer
15 years 6 months ago
Cover Algorithms and Their Combination
This paper defines the cover of a formula with respect to a set of variables V in theory T to be the strongest quantifier-free formula that is implied by V : in theory T. Cover e...
Sumit Gulwani, Madan Musuvathi
ISHPC
2000
Springer
15 years 8 months ago
Automatic Generation of OpenMP Directives and Its Application to Computational Fluid Dynamics Codes
The shared-memory programming model is a very effective way to achieve parallelism on shared memory parallel computers. As great progress was made in hardware and software technolo...
Haoqiang Jin, Michael A. Frumkin, Jerry C. Yan
UM
2010
Springer
15 years 9 months ago
Twitter, Sensors and UI: Robust Context Modeling for Interruption Management
In this paper, we present the results of a two-month field study of fifteen people using a software tool designed to model changes in a user’s availability. The software uses s...
Justin Tang, Donald J. Patterson