咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 29 篇 会议
  • 16 册 图书

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 72 篇 工学
    • 54 篇 计算机科学与技术...
    • 37 篇 软件工程
    • 7 篇 电气工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 生物医学工程(可授...
  • 15 篇 理学
    • 13 篇 数学
    • 2 篇 生物学
  • 8 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 中西医结合
    • 1 篇 护理学(可授医学、...
  • 7 篇 管理学
    • 7 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 教育学
    • 2 篇 心理学(可授教育学...
    • 1 篇 教育学

主题

  • 103 篇 program logic
  • 14 篇 program
  • 11 篇 system
  • 11 篇 verification
  • 10 篇 ibm
  • 10 篇 separation logic
  • 10 篇 data
  • 10 篇 concurrency
  • 9 篇 logic
  • 9 篇 logic manual
  • 8 篇 program verifica...
  • 8 篇 operating system
  • 7 篇 disk operating
  • 7 篇 manual
  • 7 篇 bibliography
  • 6 篇 manual program
  • 6 篇 operating
  • 5 篇 system manual
  • 5 篇 safety
  • 5 篇 publication

机构

  • 4 篇 carnegie mellon ...
  • 3 篇 aarhus univ dept...
  • 2 篇 univ sci & techn...
  • 2 篇 univ sci & techn...
  • 2 篇 kyoto univ grad ...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 max planck inst ...
  • 2 篇 yale univ new ha...
  • 2 篇 state key labora...
  • 2 篇 aarhus univ aarh...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ turin dipar...
  • 2 篇 univ london impe...
  • 1 篇 aarhus univ abog...
  • 1 篇 univ politecn ma...
  • 1 篇 alan turing inst...
  • 1 篇 sokendai hayama ...
  • 1 篇 univ calif river...
  • 1 篇 katholieke univ ...

作者

  • 6 篇 birkedal lars
  • 5 篇 vafeiadis viktor
  • 5 篇 hasuo ichiro
  • 4 篇 suenaga kohei
  • 3 篇 eberhart clovis
  • 3 篇 liang hongjin
  • 3 篇 shao zhong
  • 3 篇 feng xinyu
  • 3 篇 dreyer derek
  • 3 篇 georges aina lin...
  • 3 篇 sato tetsuya
  • 3 篇 berger martin
  • 2 篇 vale arthur oliv...
  • 2 篇 qin shengchao
  • 2 篇 pym david
  • 2 篇 he mengda
  • 2 篇 metcalfe sylvia ...
  • 2 篇 fernandez ls
  • 2 篇 docherty simon
  • 2 篇 yamada akihisa

语言

  • 98 篇 英文
  • 5 篇 其他
检索条件"主题词=Program Logic"
103 条 记 录,以下是71-80 订阅
排序:
PCFIRE: Towards Provable Preventative Control-Flow Integrity Enforcement for Realistic Embedded Software  13
PCFIRE: Towards Provable Preventative Control-Flow Integrity...
收藏 引用
16th International Conference on Embedded Software (EMSOFT)
作者: Tan, Jiaqi Tay, Hui Jun Drolia, Utsav Gandhi, Rajeev Narasimhan, Priya Carnegie Mellon Univ Dept ECE Pittsburgh PA 15213 USA
Control-Flow Integrity (CFI) is an important safety property of software, particularly in embedded and safety-critical systems, where CFI violations have led to patient deaths and can render cars remotely controllable... 详细信息
来源: 评论
GPS: Navigating Weak Memory with Ghosts, Protocols, and Separation  14
GPS: Navigating Weak Memory with Ghosts, Protocols, and Sepa...
收藏 引用
2014 ACM International Conference on Object-Oriented-programming-Systems-Languages-and-Applications (OOPSLA 14)
作者: Turon, Aaron Vafeiadis, Viktor Dreyer, Derek Max Planck Inst Software Syst MPI SWS Kaiserslautern Germany
Weak memory models formalize the inconsistent behaviors that one can expect to observe in multithreaded programs running on modern hardware. In so doing, however, they complicate the already-difficult task of reasonin... 详细信息
来源: 评论
logical equivalence for subtyping object and recursive types
Logical equivalence for subtyping object and recursive types
收藏 引用
9th Italian Conference on Theoretical Computer Science (ICTCS 2005)
作者: van Bakel, Steffen de'Liguoro, Ugo Univ Turin Dipartimento Informat I-10149 Turin Italy Univ London Imperial Coll Sci Technol & Med Dept Comp London SW7 2BZ England
Subtyping in first order object calculi is studied with respect to the logical semantics obtained by identifying terms that satisfy the same set of predicates, as formalised through an assignment system. It is shown t... 详细信息
来源: 评论
Abstraction for Conflict-Free Replicated Data Types  2021
Abstraction for Conflict-Free Replicated Data Types
收藏 引用
42nd ACM SIGPLAN International Conference on programming Language Design and Implementation (PLDI)
作者: Liang, Hongjin Feng, Xinyu Nanjing Univ State Key Lab Novel Software Technol Nanjing Jiangsu Peoples R China
Strong eventual consistency (SEC) has been used as a classic notion of correctness for Conflict-Free Replicated Data Types (CRDTs). However, it does not give proper abstractions of functionality, thus is not helpful f... 详细信息
来源: 评论
Formal Reasoning about the C11 Weak Memory Model  15
Formal Reasoning about the C11 Weak Memory Model
收藏 引用
ACM SIGPLAN Conference on Certified programs and Proofs (CPP)
作者: Vafeiadis, Viktor Max Planck Inst Software Syst MPI SWS Saarbrucken Germany
This abstract introduces the C11 weak memory model, summarises known verification results, and discusses some open problems.
来源: 评论
Formal Reasoning about Concurrent Assembly Code with Reentrant Locks
Formal Reasoning about Concurrent Assembly Code with Reentra...
收藏 引用
3rd International Symposium on Theoretical Aspects of Software Engineering
作者: Fu, Ming Zhang, Yu Li, Yong Univ Sci & Technol China Dept Comp Sci & Technol Hefei 230027 Peoples R China
This paper focuses on the problem of reasoning about concurrent assembly code with reentrant locks. Our verification technique is based on concurrent separation logic (CSL). In CSL, locks are treated as non-reentrant ... 详细信息
来源: 评论
Automated Software Verification of Hyperliveness  30th
Automated Software Verification of Hyperliveness
收藏 引用
30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) Held as Part of the 27th European Joint Conferences on Theory and Practice of Software (ETAPS)
作者: Beutner, Raven CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany
Hyperproperties relate multiple executions of a program and are commonly used to specify security and information-flow policies. Most existing work has focused on the verification of k-safety properties, i.e., propert... 详细信息
来源: 评论
Relational proofs for quantum programs
Relational proofs for quantum programs
收藏 引用
Proceedings of the ACM on programming Languages
作者: Barthe, Gilles Hsu, Justin Ying, Mingsheng Yu, Nengkun Zhou, Li Max Planck Institute for Security and Privacy Germany IMDEA Software Institute Spain Department of Computer Sciences University of Wisconsins Madison United States Centre for Quantum Software and Information University of Technology Sydney Australia State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Tsinghua University China Department of Computer Science and Technology Tsinghua University China
Relational verification of quantum programs has many potential applications in quantum and post-quantum security and other domains. We propose a relational program logic for quantum programs. The interpretation of our... 详细信息
来源: 评论
Mit :: Ai :: Aim :: Aim-378
收藏 引用
2016年
Mit :: Ai :: Aim :: Aim-378 by published by
来源: 评论
Ibm :: 360 :: Bibliography :: A22-6822-12 360 Bibliography Dec68
收藏 引用
2016年
Ibm :: 360 :: Bibliography :: A22-6822-12 360 Bibliography Dec68 by published by
来源: 评论