A model for the yield strength of overaged Al–Zn–Mg–Cu alloys

MJ Starink, SC Wang - Acta Materialia, 2003 - Elsevier
A model for the yield strength of multi-component alloys is presented and applied to
overaged Al–Zn–Mg–Cu alloys (7xxx series). The model is based on an approximation of …

SMACK: Decoupling source language details from verifier implementations

Z Rakamarić, M Emmi - … : 26th International Conference, CAV 2014, Held …, 2014 - Springer
A major obstacle to putting software verification research into practice is the high cost of
developing the infrastructure enabling the application of verification algorithms to actual …

P: safe asynchronous event-driven programming

A Desai, V Gupta, E Jackson, S Qadeer… - ACM SIGPLAN …, 2013 - dl.acm.org
We describe the design and implementation of P, a domain-specific language to write
asynchronous event driven code. P allows the programmer to specify the system as a …

Sound predictive race detection in polynomial time

Y Smaragdakis, J Evans, C Sadowski, J Yi… - ACM Sigplan …, 2012 - dl.acm.org
Data races are among the most reliable indicators of programming errors in concurrent
software. For at least two decades, Lamport's happens-before (HB) relation has served as …

Witcher: Systematic crash consistency testing for non-volatile memory key-value stores

X Fu, WH Kim, AP Shreepathi, M Ismail… - Proceedings of the …, 2021 - dl.acm.org
The advent of non-volatile main memory (NVM) enables the development of crash-
consistent software without paying storage stack overhead. However, building a correct …

A solver for reachability modulo theories

A Lal, S Qadeer, SK Lahiri - … Conference, CAV 2012, Berkeley, CA, USA …, 2012 - Springer
Consider a sequential programming language with control flow constructs such as
assignments, choice, loops, and procedure calls. We restrict the syntax of expressions in this …

Bounded model checking of multi-threaded C programs via lazy sequentialization

O Inverso, E Tomasco, B Fischer, S La Torre… - … 2014, Held as Part of the …, 2014 - Springer
Bounded model checking (BMC) has successfully been used for many practical program
verification problems, but concurrency still poses a challenge. Here we describe a new …

Predictive monitoring against pattern regular languages

Z Ang, U Mathur - Proceedings of the ACM on Programming Languages, 2024 - dl.acm.org
While current bug detection techniques for concurrent software focus on unearthing low-
level issues such as data races or deadlocks, they often fall short of discovering more …

Controlled concurrency testing via periodical scheduling

C Wen, M He, B Wu, Z Xu, S Qin - Proceedings of the 44th International …, 2022 - dl.acm.org
Controlled concurrency testing (CCT) techniques have been shown promising for
concurrency bug detection. Their key insight is to control the order in which threads get …

Verification of programs under the release-acquire semantics

PA Abdulla, J Arora, MF Atig, S Krishna - Proceedings of the 40th ACM …, 2019 - dl.acm.org
We address the verification of concurrent programs running under the release-acquire (RA)
semantics. We show that the reachability problem is undecidable even in the case where the …