Sciweavers

506 search results - page 56 / 102
» Where Is the Value in a Program Verifier
Sort
View
197
Voted
POPL
2006
ACM
16 years 26 days ago
Polymorphic regular tree types and patterns
We propose a type system based on regular tree grammars, where algebraic datatypes are interpreted in a structural way. Thus, the same constructors can be reused for different typ...
Jerome Vouillon
EDBT
2009
ACM
133views Database» more  EDBT 2009»
15 years 7 months ago
Multiplicative synopses for relative-error metrics
Existing hierarchical summarization techniques fail to provide synopses good in terms of relative-error metrics. This paper introduces multiplicative synopses: a summarization par...
Panagiotis Karras
ICSE
2009
IEEE-ACM
15 years 7 months ago
Test selection for result inspection via mining predicate rules
It is labor-intensive to manually verify the outputs of a large set of tests that are not equipped with test oracles. Test selection helps to reduce this cost by selecting a small...
Wujie Zheng, Michael R. Lyu, Tao Xie
CEC
2008
IEEE
15 years 7 months ago
On the generality of the evolved driving rules of an agent operating a model of a car
—We present an approach for automated evolutionary design of the functionary of driving agent, able to operate a software model of fast running car. The objective of our work is ...
Hirotaka Yamazaki, Ivan Tanev, Tomoyuki Hiroyasu, ...
124
Voted
CSFW
1999
IEEE
15 years 4 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...