Sciweavers

1541 search results - page 85 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
LION
2007
Springer
113views Optimization» more  LION 2007»
15 years 6 months ago
Limited-Memory Techniques for Sensor Placement in Water Distribution Networks
Abstract. The practical utility of optimization technologies is often impacted by factors that reflect how these tools are used in practice, including whether various real-world c...
William E. Hart, Jonathan W. Berry, Erik G. Boman,...
125
Voted
KBSE
2007
IEEE
15 years 7 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
69
Voted
IPPS
2010
IEEE
14 years 10 months ago
Ensuring deterministic concurrency through compilation
Abstract--Multicore shared-memory architectures are becoming prevalent but bring many programming challenges. Among the biggest is non-determinism: the output of the program does n...
Nalini Vasudevan, Stephen A. Edwards
ICFP
2012
ACM
13 years 3 months ago
Proof-producing synthesis of ML from higher-order logic
The higher-order logic found in proof assistants such as Coq and various HOL systems provides a convenient setting for the development and verification of pure functional program...
Magnus O. Myreen, Scott Owens
128
Voted
ASPDAC
2010
ACM
135views Hardware» more  ASPDAC 2010»
14 years 10 months ago
Efficient power grid integrity analysis using on-the-fly error check and reduction
In this paper, we present a new voltage IR drop analysis approach for large on-chip power delivery networks. The new approach is based on recently proposed sampling based reductio...
Duo Li, Sheldon X.-D. Tan, Ning Mi, Yici Cai