We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 3,930 results
  1. Maximal Quantified Precondition Synthesis for Linear Array Loops

    Precondition inference is an important problem with many applications in verification and testing. Finding preconditions can be tricky as programs...
    S Sumanth Prabhu, Grigory Fedyukovich, Deepak D’Souza in Programming Languages and Systems
    Conference paper Open access 2024
  2. Weakest Precondition Inference for Non-Deterministic Linear Array Programs

    Precondition inference is an important problem with many applications. Existing precondition inference techniques for programs with arrays have...
    S. Sumanth Prabhu, Deepak D’Souza, ... Grigory Fedyukovich in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2024
  3. Lifting the Reasoning Level in Generic Weak Memory Verification

    Weak memory models specify the semantics of concurrent programs on multi-core architectures. Reasoning techniques for weak memory models are often...
    Lara Bargmann, Heike Wehrheim in Integrated Formal Methods
    Conference paper 2024
  4. A Fine-Grained Semantics for Arrays and Pointers Under Weak Memory Models

    Developers of concurrent code for multicore architectures must navigate weak memory models (wmms) – either directly at the hardware/assembly level or...
    Robert J. Colvin in Formal Methods
    Conference paper 2023
  5. Kleene Algebra of Weighted Programs with Domain

    Weighted programs were recently introduced by Batz et al. (Proc. ACM Program. Lang. 2022) as a generalization of probabilistic programs which can...
    Conference paper 2024
  6. Rely/Guarantee Reasoning for Multicopy Atomic Weak Memory Models

    Rely/guarantee reasoning provides a compositional approach to reasoning about concurrent programs. However, such reasoning traditionally assumes a...
    Nicholas Coughlin, Kirsten Winter, Graeme Smith in Formal Methods
    Conference paper 2021
  7. Moral Philosophy of Artificial General Intelligence: Agency and Responsibility

    The European Parliament recently proposed to grant the personhood of autonomous AI, which raises fundamental questions concerning the ethical nature...
    Yoshihiro Maruyama in Artificial General Intelligence
    Conference paper 2022
  8. Lightweight precise automatic extraction of exception preconditions in java methods

    When a method throws an exception— its exception precondition —is a crucial element of the method’s documentation that clients should know to properly...

    Diego Marcilio, Carlo A. Furia in Empirical Software Engineering
    Article Open access 26 December 2023
  9. Automating deductive verification for weak-memory programs (extended version)

    Writing correct programs for weak-memory models such as the C11 memory model is challenging because of the weak consistency guarantees these models...

    Article 06 March 2020
  10. Specifying the Boundary Between Unverified and Verified Code

    This paper introduces a specification construct that is fitting when combining verified code with unverified code. The specification is a form of...
    David R. Cok, K. Rustan M. Leino in The Logic of Software. A Tasting Menu of Formal Methods
    Chapter 2022
  11. SMT-Based Test-Case Generation and Validation for Programs with Complex Specifications

    We present a system which automatically generates an exhaustive set of black-box test-cases, up to a given size, for units under test requiring...
    Ricardo Peña, Jaime Sánchez-Hernández, ... Javier Sagredo in Analysis, Verification and Transformation for Declarative Programming and Intelligent Systems
    Chapter 2023
  12. Reliability and Interpretability in Science and Deep Learning

    In recent years, the question of the reliability of Machine Learning (ML) methods has acquired significant importance, and the analysis of the...

    Luigi Scorzato in Minds and Machines
    Article Open access 25 June 2024
  13. Inferring Interval-Valued Floating-Point Preconditions

    Aggregated roundoff errors caused by floating-point arithmetic can make numerical code highly unreliable. Verified postconditions for floating-point...
    Jonas Krämer, Lionel Blatter, ... Mattias Ulbrich in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2022
  14. Integrating Owicki–Gries for C11-Style Memory Models into Isabelle/HOL

    Weak memory presents a new challenge for program verification and has resulted in the development of a variety of specialised logics. For C11-style...

    Sadegh Dalvandi, Brijesh Dongol, ... Heike Wehrheim in Journal of Automated Reasoning
    Article Open access 16 November 2021
  15. Automatic Execution of the Ontological Piloting Procedures

    Intelligent educational systems currently use ontological knowledge modeling for their expert component. The associated semantics of the ontological...
    Marc-Antoine Courtemanche, Ange Tato, Roger Nkambou in Augmented Intelligence and Intelligent Tutoring Systems
    Conference paper 2023
  16. Verifying Read-Copy Update Under RC11

    Read-Copy Update (RCU) is a key lock-free synchronisation mechanism that is used extensively in the Linux kernel. One use of RCU is safe memory...
    Mikhail Semenyuk, Mark Batty, Brijesh Dongol in Software Engineering and Formal Methods
    Conference paper 2023
  17. Overcoming Memory Weakness with Unified Fairness

    We consider the verification of liveness properties for concurrent programs running on weak memory models. To that end, we identify notions of...
    Parosh Aziz Abdulla, Mohamed Faouzi Atig, ... Mihir Vahanwala in Computer Aided Verification
    Conference paper Open access 2023
  18. Rotational-XOR Differential Rectangle Cryptanalysis on Simon-Like Ciphers

    In this paper, we propose a rectangle-like method called rotational-XOR differential rectangle attack to search for better distinguishers. It is a...
    Siwei Chen, Mingming Zhu, ... Shasha Zhang in Topics in Cryptology – CT-RSA 2023
    Conference paper 2023
  19. CGPM: Poverty Map** Framework Based on Multi-Modal Geographic Knowledge Integration and Macroscopic Social Network Mining

    Having high-precision and high-resolution poverty map is a prerequisite for monitoring the United Nations Sustainable Development Goals(SDGs) and for...
    Zhao Geng, Gao Ziqing, ... Lu Jiamin in Machine Learning and Knowledge Discovery in Databases
    Conference paper 2023
  20. Refinement of Parallel Algorithms Down to LLVM: Applied to Practically Efficient Parallel Sorting

    We present a stepwise refinement approach to develop verified parallel algorithms, down to efficient LLVM code. The resulting algorithms’ performance...

    Article Open access 19 June 2024
Did you find what you were looking for? Share feedback.