Sciweavers

2989 search results - page 58 / 598
» Using Domain-Independent Problems for Introducing Formal Met...
Sort
View
IWFM
2003
14 years 11 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
JAR
2002
72views more  JAR 2002»
14 years 9 months ago
Partial Instantiation Methods for Inference in First-Order Logic
Satisfiability algorithms for propositional logic have improved enormously in recently years. This improvement increases the attractiveness of satisfiability methods for first-orde...
John N. Hooker, G. Rago, V. Chandru, A. Shrivastav...
IJIT
2004
14 years 11 months ago
Modeling Biology Inspired Reactive Agents Using X-machines
Recent advances in both the testing and verification of software based on formal specifications of the system to be built have reached a point where the ideas can be applied in a p...
George Eleftherakis, Petros Kefalas, Anna Sotiriad...
TLDI
2009
ACM
140views Formal Methods» more  TLDI 2009»
15 years 6 months ago
Design patterns in separation logic
Object-oriented programs are notable for making use of both rder abstractions and mutable, aliased state. Either feature alone is challenging for formal verification, and the com...
Neelakantan R. Krishnaswami, Jonathan Aldrich, Lar...
EOR
2006
130views more  EOR 2006»
14 years 9 months ago
A Benders decomposition approach for the robust spanning tree problem with interval data
The robust spanning tree problem is a variation, motivated by telecommunications applications, of the classic minimum spanning tree problem. In the robust spanning tree problem ed...
Roberto Montemanni