The Spec# programming system: An overview

M Barnett, KRM Leino, W Schulte - … on Construction and Analysis of Safe …, 2004 - Springer
The Spec# programming system is a new attempt at a more cost effective way to develop
and maintain high-quality software. This paper describes the goals and architecture of the …

A practical approach to programming with assertions

DS Rosenblum - IEEE transactions on Software Engineering, 1995 - ieeexplore.ieee.org
Embedded assertions have been recognized as a potentially powerful tool for automatic
runtime detection of software faults during debugging, testing, maintenance and even …

Specification and verification: the Spec# experience

M Barnett, M Fähndrich, KRM Leino, P Müller… - Communications of the …, 2011 - dl.acm.org
Specification and verification: the Spec# experience Page 1 juNe 2011 | voL. 54 | No. 6 |
CoMMuniCATions of The ACM 81 problem in the context of modern object-oriented languages …

Safe, untrusted agents using proof-carrying code

GC Necula, P Lee - Mobile agents and security, 1998 - Springer
Abstract Proof-Carrying Code (PCC) enables a computer system to determine, automatically
and with certainty, that program code provided by another system is safe to install and …

[图书][B] Compiling with proofs

GC Necula - 1998 - search.proquest.com
One of the major challenges of building software systems is to ensure that the various
components fit together in a well-defined manner. This problem is exacerbated by the recent …

Algebraic simplification

B Buchberger, R Loos - Computer algebra: symbolic and algebraic …, 1982 - Springer
Some basic techniques for the simplification of terms are surveyed. In two introductory
sections the problem of canonical algebraic simplification is formally stated and some …

EVES: An overview

D Craigen, S Kromodimoeljo, I Meisels, B Pase… - VDM'91 Formal Software …, 1991 - Springer
In this paper we describe a new formal methods tool called EVES. EVES consists of a set
theoretic language, called Verdi, and an automated deduction system, called NEVER. We …

[图书][B] Mobile agents and security

G Vigna - 2003 - books.google.com
New paradigms can popularize old technologies. A new\standalone" paradigm, the
electronic desktop, popularized the personal computer. A new\connected" paradigm, the …

Putting the semantics into semantic versioning

P Lam, J Dietrich, DJ Pearce - Proceedings of the 2020 ACM SIGPLAN …, 2020 - dl.acm.org
The long-standing aspiration for software reuse has made astonishing strides in the past few
years. Many modern software development ecosystems now come with rich sets of publicly …

Effective theorem proving for hardware verification

D Cyrluk, S Rajan, N Shankar, MK Srivas - International Conference on …, 1994 - Springer
The attractiveness of using theorem provers for system design verification lies in their
generality. The major practical challenge confronting theorem proving technology is in …