Sciweavers

1036 search results - page 20 / 208
» Verification Programs for Abduction
Sort
View
POPL
2010
ACM
15 years 10 months ago
Modular Verification of Security Protocol Code by Typing
Andrew D. Gordon, Cédric Fournet, Karthikey...
205
Voted
ICFP
2009
ACM
16 years 1 months ago
Biorthogonality, step-indexing and compiler correctness
We define logical relations between the denotational semantics of a simply typed functional language with recursion and the operational behaviour of low-level programs in a varian...
Nick Benton, Chung-Kil Hur
197
Voted
POPL
2008
ACM
16 years 29 days ago
Proving non-termination
The search for proof and the search for counterexamples (bugs) are complementary activities that need to be pursued concurrently in order to maximize the practical success rate of...
Ashutosh Gupta, Thomas A. Henzinger, Rupak Majumda...
122
Voted
DAGSTUHL
2001
15 years 2 months ago
Extended Static Checking: A Ten-Year Perspective
A powerful approach to finding errors in computer software is to translate a given program into a verification condition, a logical formula that is valid if and only if the program...
K. Rustan M. Leino
PPOPP
2009
ACM
16 years 1 months ago
Formal verification of practical MPI programs
This paper considers the problem of formal verification of MPI programs operating under a fixed test harness for safety properties without building verification models. In our app...
Anh Vo, Sarvani S. Vakkalanka, Michael Delisi, Gan...