Sciweavers

139 search results - page 5 / 28
» Totally Verified Systems: Linking Verified Software to Verif...
Sort
View
107
Voted
CAV
2009
Springer
177views Hardware» more  CAV 2009»
15 years 10 months ago
Software Transactional Memory on Relaxed Memory Models
Abstract. Pseudo-code descriptions of STMs assume sequentially consistent program execution and atomicity of high-level STM operations like read, write, and commit. These assumptio...
Rachid Guerraoui, Thomas A. Henzinger, Vasu Singh
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
15 years 6 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
TLDI
2005
ACM
126views Formal Methods» more  TLDI 2005»
15 years 3 months ago
Type inference for atomicity
Atomicity is a fundamental correctness property in multithreaded programs. This paper presents an algorithm for verifying atomicity via type inference. The underlying type system ...
Cormac Flanagan, Stephen N. Freund, Marina Lifshin
CAV
2004
Springer
140views Hardware» more  CAV 2004»
15 years 1 months ago
Indexed Predicate Discovery for Unbounded System Verification
Predicate abstraction has been proved effective for verifying several infinite-state systems. In predicate abstraction, an abstract system is automatinstructed given a set of predi...
Shuvendu K. Lahiri, Randal E. Bryant
CASES
2001
ACM
15 years 1 months ago
A vision for embedded software
In this paper we describe a vision for the future evolution of Embedded SW (ESW) design methodologies as part of overall Embedded Systems (ES) development. Fundamentally, we belie...
Alberto L. Sangiovanni-Vincentelli, Grant Martin