Sciweavers

1541 search results - page 47 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
124
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
DAC
2005
ACM
16 years 1 months ago
Minimising buffer requirements of synchronous dataflow graphs with model checking
Signal processing and multimedia applications are often implemented on resource constrained embedded systems. It is therefore important to find implementations that use as little ...
Marc Geilen, Twan Basten, Sander Stuijk
79
Voted
APSEC
2000
IEEE
15 years 5 months ago
A comparative evaluation of techniques for syntactic level source code analysis
Many program maintenance tools rely on traditional parsing techniques to obtain syntactic level models of the code being maintained. When, for some reason, code cannot be parsed, ...
Anthony Cox, Charles L. A. Clarke
ICCAD
2002
IEEE
176views Hardware» more  ICCAD 2002»
15 years 9 months ago
High capacity and automatic functional extraction tool for industrial VLSI circuit designs
In this paper we present an advanced functional extraction tool for automatic generation of high-level RTL from switch-level circuit netlist representation. The tool is called FEV...
Sasha Novakovsky, Shy Shyman, Ziyad Hanna
88
Voted
SIGSOFT
2002
ACM
16 years 1 months ago
Invariant inference for static checking
Static checking can verify the absence of errors in a program, but often requires written annotations or specifications. As a result, static checking can be difficult to use effec...
Jeremy W. Nimmer, Michael D. Ernst