Software model checking
Software model checking Page 1 21 Software Model Checking RANJIT JHALA University of
California, San Diego and RUPAK MAJUMDAR University of California, Los Angeles We survey …
California, San Diego and RUPAK MAJUMDAR University of California, Los Angeles We survey …
ViBe: a powerful random technique to estimate the background in video sequences
O Barnich… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
Background subtraction is a crucial step in many automatic video content analysis
applications. While numerous acceptable techniques have been proposed so far for …
applications. While numerous acceptable techniques have been proposed so far for …
Directed symbolic execution
In this paper, we study the problem of automatically finding program executions that reach a
particular target line. This problem arises in many debugging scenarios; for example, a …
particular target line. This problem arises in many debugging scenarios; for example, a …
[CARTE][B] Heuristic search: theory and applications
S Edelkamp, S Schrödl - 2011 - books.google.com
Search has been vital to artificial intelligence from the very beginning as a core technique in
problem solving. The authors present a thorough overview of heuristic search with a balance …
problem solving. The authors present a thorough overview of heuristic search with a balance …
A systematic literature review on counterexample explanation
Context: Safety is of paramount importance for cyber–physical systems in domains such as
automotive, robotics, and avionics. Formal methods such as model checking are one way to …
automotive, robotics, and avionics. Formal methods such as model checking are one way to …
Engraft: Enclave-guarded raft on byzantine faulty nodes
This paper presents the first critical analysis of building highly secure, performant, and
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
Towards a framework for certification of reliable autonomous systems
A computational system is called autonomous if it is able to make its own decisions, or take
its own actions, without human supervision or control. The capability and spread of such …
its own actions, without human supervision or control. The capability and spread of such …
Statically-directed dynamic automated test generation
We present a new technique for exploiting static analysis to guide dynamic automated test
generation for binary programs, prioritizing the paths to be explored. Our technique is a …
generation for binary programs, prioritizing the paths to be explored. Our technique is a …
Quantitative verification: models techniques and tools
M Kwiatkowska - Proceedings of the the 6th joint meeting of the …, 2007 - dl.acm.org
Automated verification is a technique for establishing if certain properties, usually expressed
in temporal logic, hold for a system model. The model can be defined using a high-level …
in temporal logic, hold for a system model. The model can be defined using a high-level …
Refinement of trace abstraction
We present a new counterexample-guided abstraction refinement scheme. The scheme
refines an over-approximation of the set of possible traces. Each refinement step introduces …
refines an over-approximation of the set of possible traces. Each refinement step introduces …