Software model checking

R Jhala, R Majumdar - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
Software model checking Page 1 21 Software Model Checking RANJIT JHALA University of
California, San Diego and RUPAK MAJUMDAR University of California, Los Angeles We survey …

The treatment of the long‐term sequelae of child abuse

J Stevenson - Journal of Child Psychology and Psychiatry, 1999 - Wiley Online Library
The literature on the long‐term sequelae of sexual and physical abuse is reviewed. Abused
children are at risk of long‐term adverse psychological sequelae related to the abuse per se …

Narcissism, self-esteem, and the positivity of self-views: Two portraits of self-love

WK Campbell, EA Rudich… - Personality and Social …, 2002 - journals.sagepub.com
The authors hypothesized that both narcissism and high self-esteem are associated with
positive self-views but each is associated with positivity in different domains of the self …

SMT-based bounded model checking for embedded ANSI-C software

L Cordeiro, B Fischer… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Propositional bounded model checking has been applied successfully to verify embedded
software, but remains limited by increasing propositional formula sizes and the loss of high …

A scalable and highly available web server

DM Dias, W Kish, R Mukherjee… - … '96. Technologies for the …, 1996 - ieeexplore.ieee.org
We describe a prototype scalable and highly available web server, built on an IBM SP-2
system, and analyze its scalability. The system architecture consists of a set of logical front …

Verifying multi-threaded software using SMT-based context-bounded model checking

L Cordeiro, B Fischer - Proceedings of the 33rd International Conference …, 2011 - dl.acm.org
We describe and evaluate three approaches to model check multi-threaded software with
shared variables and locks using bounded model checking based on Satisfiability Modulo …

Scaling up the formal verification of Lustre programs with SMT-based techniques

G Hagen, C Tinelli - 2008 Formal Methods in Computer-Aided …, 2008 - ieeexplore.ieee.org
We present a general approach for verifying safety properties of Lustre programs
automatically. Key aspects of the approach are the choice of an expressive first-order logic …

Rewriting modulo SMT and open system analysis

C Rocha, J Meseguer, C Muñoz - … of Logical and Algebraic Methods in …, 2017 - Elsevier
This paper proposes rewriting modulo SMT, a new technique that combines the power of
SMT solving, rewriting modulo theories, and model checking. Rewriting modulo SMT is …

Attachment models of the self and others: Relations with self‐esteem, humanity‐esteem, and parental treatment

MA Luke, GR Maio, KB Carnelley - Personal Relationships, 2004 - Wiley Online Library
The present research tested the extent to which perceptions of early childhood experiences
with parents predicted general views of the self (ie, self‐esteem) and others (ie, humanity …

Generalized rewrite theories, coherence completion, and symbolic methods

J Meseguer - Journal of Logical and Algebraic Methods in …, 2020 - Elsevier
A new notion of generalized rewrite theory suitable for symbolic reasoning and generalizing
the standard notion in [19] is motivated and defined. Also, new requirements for symbolic …