Analysis and transformation of constrained Horn clauses for program verification
This paper surveys recent work on applying analysis and transformation techniques that
originate in the field of constraint logic programming (CLP) to the problem of verifying …
originate in the field of constraint logic programming (CLP) to the problem of verifying …
Energy consumption analysis of programs based on XMOS ISA-level models
Energy consumption analysis of embedded programs requires the analysis of low-level
program representations. This is challenging because the gap between the high-level …
program representations. This is challenging because the gap between the high-level …
Static analysis of energy consumption for LLVM IR programs
Energy models can be constructed by characterizing the energy consumed when executing
each instruction in a processor's instruction set. This can be used to determine how much …
each instruction in a processor's instruction set. This can be used to determine how much …
Interval-based resource usage verification by translation into Horn clauses and an application to energy consumption
P Lopez-Garcia, L Darmawan, M Klemen… - Theory and Practice of …, 2018 - cambridge.org
Many applications require conformance with specifications that constrain the use of
resources, such as execution time, energy, bandwidth, etc. We present a configurable …
resources, such as execution time, energy, bandwidth, etc. We present a configurable …
Cost analysis of smart contracts via parametric resource analysis
V Pérez, M Klemen, P López-García, JF Morales… - Static Analysis: 27th …, 2020 - Springer
The very nature of smart contracts and blockchain platforms, where program execution and
storage are replicated across a large number of nodes, makes resource consumption …
storage are replicated across a large number of nodes, makes resource consumption …
Energy transparency for deeply embedded programs
K Georgiou, S Kerrison, Z Chamski, K Eder - ACM Transactions on …, 2017 - dl.acm.org
Energy transparency is a concept that makes a program's energy consumption visible, from
hardware up to software, through the different system layers. Such transparency can enable …
hardware up to software, through the different system layers. Such transparency can enable …
Parallel logic programming: A sequel
Multi-core and highly connected architectures have become ubiquitous, and this has
brought renewed interest in language-based approaches to the exploitation of parallelism …
brought renewed interest in language-based approaches to the exploitation of parallelism …
Iterative mining of resource-releasing specifications
Q Wu, G Liang, Q Wang, T Xie… - 2011 26th IEEE/ACM …, 2011 - ieeexplore.ieee.org
Software systems commonly use resources such as network connections or external file
handles. Once finish using the resources, the software systems must release these …
handles. Once finish using the resources, the software systems must release these …
Towards data-aware qos-driven adaptation for service orchestrations
D Ivanovic, M Carro… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Several activities in service oriented computing can benefit from knowing properties of a
given service composition ahead of time. We will focus here on properties related to …
given service composition ahead of time. We will focus here on properties related to …
Incremental and modular context-sensitive analysis
I Garcia-Contreras, JF Morales… - Theory and Practice of …, 2021 - cambridge.org
Context-sensitive global analysis of large code bases can be expensive, which can make its
use impractical during software development. However, there are many situations in which …
use impractical during software development. However, there are many situations in which …