Sciweavers

1036 search results - page 122 / 208
» Verification Programs for Abduction
Sort
View
SIGSOFT
2008
ACM
16 years 5 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
SIGSOFT
2005
ACM
16 years 5 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken
POPL
2007
ACM
16 years 4 months ago
Context logic as modal logic: completeness and parametric inexpressivity
Separation Logic, Ambient Logic and Context Logic are based on a similar style of reasoning about structured data. They each consist of a structural (separating) composition for r...
Cristiano Calcagno, Philippa Gardner, Uri Zarfaty
HICSS
2006
IEEE
164views Biometrics» more  HICSS 2006»
15 years 10 months ago
A Methodology for Generating Application-Specific Heterogeneous Processor Arrays
Hardware designers are increasingly turning to Single Chip Multi-Processors to achieve power and throughput goals. To further increase performance for a specific application the c...
Stephen D. Craven, Cameron Patterson, Peter M. Ath...
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
15 years 10 months ago
Using software testing to move students from trial-and-error to reflection-in-action
Introductory computer science students rely on a trial and error approach to fixing errors and debugging for too long. Moving to a reflection in action strategy can help students ...
Stephen H. Edwards