Sciweavers

1036 search results - page 186 / 208
» Verification Programs for Abduction
Sort
View
CADE
2009
Springer
16 years 5 months ago
Solving Non-linear Polynomial Arithmetic via SAT Modulo Linear Arithmetic
Abstract. Polynomial constraint-solving plays a prominent role in several areas of engineering and software verification. In particular, polynomial constraint solving has a long an...
Albert Rubio, Cristina Borralleras, Enric Rodr&iac...
SIGCSE
2009
ACM
119views Education» more  SIGCSE 2009»
16 years 5 months ago
Implications of integrating test-driven development into CS1/CS2 curricula
Many academic and industry professionals have called for more testing in computer science curricula. Test-driven development (TDD) has been proposed as a solution to improve testi...
Chetan Desai, David S. Janzen, John Clements
CADE
2008
Springer
16 years 4 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
ICALP
2009
Springer
16 years 4 months ago
On Regular Temporal Logics with Past,
The IEEE standardized Property Specification Language, PSL for short, extends the well-known linear-time temporal logic LTL with so-called semi-extended regular expressions. PSL an...
Christian Dax, Felix Klaedtke, Martin Lange
SIGMOD
2008
ACM
143views Database» more  SIGMOD 2008»
16 years 4 months ago
A case study in database reliability: component types, usage profiles, and testing
Data management lies at the core of most modern information technology deployments. Accordingly, the reliability of the database management system (DBMS) is critical to the reputa...
C. A. Taylor, Mechelle Gittens, Andriy V. Miransky...