Sciweavers

1054 search results - page 148 / 211
» Using Component Abstraction for Automatic Generation of Macr...
Sort
View
CAV
2011
Springer
253views Hardware» more  CAV 2011»
14 years 1 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
CADE
2009
Springer
15 years 10 months ago
A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs
Abstract. An approach based on term rewriting techniques for the automated termination analysis of imperative programs operating on integers is presented. An imperative program is ...
Stephan Falke, Deepak Kapur
FMCAD
2007
Springer
15 years 3 months ago
Induction in CEGAR for Detecting Counterexamples
— Induction has been studied in model checking for proving the validity of safety properties, i.e., showing the absence of counterexamples. To our knowledge, induction has not be...
Chao Wang, Aarti Gupta, Franjo Ivancic
VIZSEC
2007
Springer
15 years 3 months ago
Visualization of Host Behavior for Network Security
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
F. Mansman, L. Meier, Daniel A. Keim
HPCC
2007
Springer
15 years 1 months ago
Checkpointing Aided Parallel Execution Model and Analysis
Abstract. Checkpointing techniques are usually used to secure the execution of sequential and parallel programs. However, they can also be used in order to generate automatically a...
Laura Mereuta, Éric Renault