• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 9 of 9

The SLAM project: debugging system software via static analysis

by Thomas Ball, Sriram K. Rajamani - SIGPLAN Not
"... Abstract. The goal of the SLAM project is to check whether or not a program obeys "API usage rules " that specif[y what it means to be a good client of an API. The SLAM toolkit statically analyzes a C program to determine whether or not it violates given usage rules. The toolkit has two un ..."
Abstract - Cited by 472 (17 self) - Add to MetaCart
Abstract. The goal of the SLAM project is to check whether or not a program obeys "API usage rules " that specif[y what it means to be a good client of an API. The SLAM toolkit statically analyzes a C program to determine whether or not it violates given usage rules. The toolkit has two

Automatic predicate abstraction of C programs

by Thomas Ball , Rupak Majumdar, Todd Millstein, Sriram K. Rajamani - IN PROC. ACM PLDI , 2001
"... Model checking has been widely successful in validating and debugging designs in the hardware and protocol domains. However, state-space explosion limits the applicability of model checking tools, so model checkers typically operate on abstractions of systems. Recently, there has been significant in ..."
Abstract - Cited by 488 (33 self) - Add to MetaCart
of programs written in an industrial programming language such as C, and its implementation in a tool-- C2bp. The C2bp tool is part of the SLAM toolkit, which uses a combination of predicate abstraction, model checking, symbolic reasoning, and iterative refinement to statically check temporal safety

Automatically validating temporal safety properties of interfaces

by Thomas Ball, Sriram K. Rajamani , 2001
"... We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property of interest. It then automatically creates abstractions of C code using iterative refinement, based on the given property. The pro ..."
Abstract - Cited by 433 (21 self) - Add to MetaCart
. The process is realized in the SLAM toolkit, which consists of a model checker, predicate abstraction tool and predicate discovery tool. We have applied the SLAM toolkit to a number of Windows NT device drivers to validate critical safety properties such as correct locking behavior. We have found

ABSTRACT Model Checking Concurrent Linux Device Drivers

by Thomas Witkowski, Nicolas Blanc, Daniel Kroening, Georg Weissenbacher
"... The Slam toolkit demonstrates that predicate abstraction enables automated verification of real world Windows device drivers. Our predicate abstraction-based tool DDVerify enables the automated verification of Linux device drivers and provides an accurate model of the relevant parts of the kernel. W ..."
Abstract - Add to MetaCart
The Slam toolkit demonstrates that predicate abstraction enables automated verification of real world Windows device drivers. Our predicate abstraction-based tool DDVerify enables the automated verification of Linux device drivers and provides an accurate model of the relevant parts of the kernel

Derivation and Implementation of a Full 6D EKF-based Solution to Bearing-Range SLAM

by Jose-luis Blanco , 2008
"... This report addresses the formulation and the implementation of a full 6D (3D positions plus 3D attitude angles) solution to Simultaneous Localization and Mapping (SLAM) using a range and bearing sensor. It will be not assumed here that the sensor coordinate reference system coincide with that of th ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
This report addresses the formulation and the implementation of a full 6D (3D positions plus 3D attitude angles) solution to Simultaneous Localization and Mapping (SLAM) using a range and bearing sensor. It will be not assumed here that the sensor coordinate reference system coincide

Computer Science Research Proposal Automated Statistical Abstraction of Programs

by Michael J A Smith , 2005
"... The application of automated theorem proving to program verification is increasingly being used in real-world situations, most of which are concerned with proving safety properties of code. For example, the Berkeley Lazy Abstraction Software Verification Tool [4] (Blast), and Microsoft r○’s SLAM Too ..."
Abstract - Add to MetaCart
The application of automated theorem proving to program verification is increasingly being used in real-world situations, most of which are concerned with proving safety properties of code. For example, the Berkeley Lazy Abstraction Software Verification Tool [4] (Blast), and Microsoft r○’s SLAM

Polymorphic predicate abstraction

by Thomas Ball, Todd Millstein, Sriram K. Rajamani - ACM Transactions on Programming Languages and Systems , 2000
"... Predicate abstraction is a technique for creating abstract models of software that are amenable to model checking algorithms. We show how polymorphism, a well-known concept in programming languages and program analysis, can be incorporated in a predicate abstraction algorithm for C programs. The use ..."
Abstract - Cited by 25 (7 self) - Add to MetaCart
applications containing the procedure. Polymorphism also enables us to handle programs that need to be analyzed in an open environment, for all possible callers. We have proved that our algorithm is sound and have implemented it in the C2BP tool as part of the SLAM software model checking toolkit.

DEVELOPMENT OF PARTICLE METHOD REPRESENTING FLOATING BODIES WITH HIGHLY NON-LINEARWAVES

by Tsukamoto Marcio Michiharu, Nishimoto Kazuo, Asanuma Takayuki
"... Abstract. A numerical method called Moving Particle Semi-implicit (MPS) method was developed to analyze incompress-ible non-viscous flow. It is a particle method using a lagrangean representation without any grid. The governing equations are the Navier-Stokes equation and continuity equation. Most o ..."
Abstract - Add to MetaCart
of the computational fluid dynamics (CFD) methods are based on eulerian representation and use grids to describe the geometry of the simulated domain. These differences make the MPS method easier to analyze highly nonlinear phenomena as free surface with wave breaking, sloshing, slamming, etc. In previously published

ACKNOWLEDGMENTS

by Shahar Kosti, This Prof, Gal A. Kaminka, David Sarne
"... First, I would like to thank my advisors Prof. Gal A. Kaminka and Dr. David Sarne for their excellent guidance and constant support in the past two years. I learned quite a bit about scientific research, all thanks to their great instruction. Working with them was a real pleasure, not only on the pr ..."
Abstract - Add to MetaCart
First, I would like to thank my advisors Prof. Gal A. Kaminka and Dr. David Sarne for their excellent guidance and constant support in the past two years. I learned quite a bit about scientific research, all thanks to their great instruction. Working with them was a real pleasure, not only on the professional level, but on the personal level as well. Thanks to my colleagues and friends from the Bar-Ilan University in general, and MAVERICK lab in particular, for the great time we had together. Special thanks to Gabriella Melamed, MAVERICK lab manager, for assisting with administra-tive issues, and in particular for helping with the arrangements for the experiment. I also wish to thank Tal-Oron Gilad from Ben-Gurion University, for providing us with a He-brew translation of the NASA-TLX questionnaire. Thanks to my dear family for their support and encouragement, and for enabling me to com-plete this work. Thanks to my girlfriend for her patience and understanding. Finally, I would like to thank my grandfather, who never ceased to encourage me throughout this journey.
Results 1 - 9 of 9
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University