Sciweavers

CAV
2012
Springer
198views Hardware» more  CAV 2012»
13 years 7 months ago
Termination Analysis with Algorithmic Learning
An algorithmic-learning-based termination analysis technique is presented. The new technique combines transition predicate abstraction, algorithmic learning, and decision procedure...
Wonchan Lee, Bow-Yaw Wang, Kwangkeun Yi
CAV
2012
Springer
257views Hardware» more  CAV 2012»
13 years 7 months ago
CSolve: Verifying C with Liquid Types
We present CSolve, an automated verifier for C programs based on Liquid Type inference. We show how CSolve verifies memory safety through an example and describe its architecture...
Patrick Maxim Rondon, Alexander Bakst, Ming Kawagu...
CAV
2012
Springer
242views Hardware» more  CAV 2012»
13 years 7 months ago
Exercises in Nonstandard Static Analysis of Hybrid Systems
Abstract. In formal verification of hybrid systems, a big challenge is to incorporate continuous flow dynamics in a discrete framework. Our previous work proposed to use nonstand...
Ichiro Hasuo, Kohei Suenaga
CAV
2012
Springer
251views Hardware» more  CAV 2012»
13 years 7 months ago
A Model Checker for Hierarchical Probabilistic Real-Time Systems
Real-life systems are usually hard to control, due to their complicated structures, quantitative time factors and even stochastic behaviors. In this work, we present a model checke...
Songzheng Song, Jun Sun 0001, Yang Liu 0003, Jin S...
CAV
2012
Springer
243views Hardware» more  CAV 2012»
13 years 7 months ago
SPT: Storyboard Programming Tool
elor Thesis: Demand Driven Abstraction Refinement Kendriya Vidyalaya ONGC, Dehradun, Uttaranchal INDIA All India Senior Secondary Examination, May 2004 • Secured 97.6 % marks in...
Rishabh Singh, Armando Solar-Lezama
CAV
2012
Springer
334views Hardware» more  CAV 2012»
13 years 7 months ago
Joogie: Infeasible Code Detection for Java
We present Joogie, a tool that detects infeasible code in Java programs. Infeasible code is code that does not occur on feasible controlflow paths and thus has no feasible executi...
Stephan Arlt, Martin Schäf
CAV
2012
Springer
241views Hardware» more  CAV 2012»
13 years 7 months ago
Bma: Visual Tool for Modeling and Analyzing Biological Networks
Abstract. BioModel Analyzer (bma) is a tool for modeling and analyzing biological networks. Designed with a lightweight graphical user interface, the tool facilitates usage for bio...
David Benque, Sam Bourton, Caitlin Cockerton, Byro...
CAV
2012
Springer
270views Hardware» more  CAV 2012»
13 years 7 months ago
Automated Termination Proofs for Java Programs with Cyclic Data
Abstract. In earlier work, we developed a technique to prove termination of Java programs automatically: first, Java programs are automatically transformed to term rewrite systems...
Marc Brockschmidt, Richard Musiol, Carsten Otto, J...
CAV
2012
Springer
265views Hardware» more  CAV 2012»
13 years 7 months ago
An Axiomatic Memory Model for POWER Multiprocessors
The growing complexity of hardware optimizations employed by multiprocessors leads to subtle distinctions among allowed and disallowed behaviors, posing challenges in specifying th...
Sela Mador-Haim, Luc Maranget, Susmit Sarkar, Kayv...
CAV
2012
Springer
222views Hardware» more  CAV 2012»
13 years 7 months ago
Leveraging Interpolant Strength in Model Checking
Craig interpolation is a well known method of abstraction successfully used in both hardware and software model checking. The logical strength of interpolants can affect the quali...
Simone Fulvio Rollini, Ondrej Sery, Natasha Sharyg...