Sciweavers

1541 search results - page 50 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
ENTCS
2006
112views more  ENTCS 2006»
15 years 16 days ago
Distributed Symbolic Bounded Property Checking
In this paper we describe an algorithm for distributed, BDD-based bounded property checking and its implementation in the verification tool SymC. The distributed algorithm verifie...
Pradeep Kumar Nalla, Roland J. Weiss, Prakash Moha...
QEST
2007
IEEE
15 years 6 months ago
Probabilistic Model Checking Modulo Theories
— Probabilistic models are widely used to analyze embedded, networked, and more recently biological systems. Existing numerical analysis techniques are limited to finitestate mo...
Björn Wachter, Lijun Zhang, Holger Hermanns
88
Voted
SIGGRAPH
1991
ACM
15 years 4 months ago
Sculpting: an interactive volumetric modeling technique
We present a new interactive modeling technique based on the notion of sculpting a solid material. A sculpting tool is controlled by a 3D input device and the material is represen...
Tinsley A. Galyean, John F. Hughes
POPL
2011
ACM
14 years 3 months ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen
DSN
2005
IEEE
15 years 6 months ago
Checking Array Bound Violation Using Segmentation Hardware
The ability to check memory references against their associated array/buffer bounds helps programmers to detect programming errors involving address overruns early on and thus avo...
Lap-Chung Lam, Tzi-cker Chiueh