Sciweavers

1036 search results - page 115 / 208
» Verification Programs for Abduction
Sort
View
WSC
2007
15 years 6 months ago
Validating a network simulation testbed for army UAVs
Auburn University, through the Army’s Aviation and Missile Research, Development and Engineering Center (AMRDEC) has been supporting the Unmanned Systems Initiative (USI) progra...
Stephen Hamilton, Colonel Timothy Schmoyer, J. A. ...
DICS
2006
15 years 6 months ago
Advances in the Design and Implementation of Group Communication Middleware
Abstract. Group communication is a programming abstraction that allows a distributed group of processes to provide a reliable service in spite of the possibility of failures within...
Daniel C. Bünzli, Rachele Fuzzati, Sergio Men...
FMICS
2010
Springer
15 years 4 months ago
Range Analysis of Microcontroller Code Using Bit-Level Congruences
Bitwise instructions, loops and indirect data access pose difficult challenges to the verification of microcontroller programs. In particular, it is necessary to show that an indir...
Jörg Brauer, Andy King, Stefan Kowalewski
SIGSOFT
2010
ACM
15 years 2 months ago
Top ten ways to make formal methods for HPC practical
Almost all fundamental advances in science and engineering crucially depend on the availability of extremely capable high performance computing (HPC) systems. Future HPC systems w...
Ganesh Gopalakrishnan, Robert M. Kirby
SIGSOFT
2010
ACM
15 years 2 months ago
Embracing policy engineering
Declarative policies play a central role in many modern software systems. Engineering policies and their interactions with programs raises many interesting open questions. Categor...
Kathi Fisler, Shriram Krishnamurthi, Daniel J. Dou...