A class of reversible variable length codes for robust image and video coding

J Wen, JD Villasenor - Proceedings of International Conference …, 1997 - ieeexplore.ieee.org
We describe a class of parameterized reversible variable length codes that have length
distributions identical to Golomb-Rice codes and exp-Golomb codes. The pdfs to which …

Refinement calculus: A basis for translation validation, debugging and certification

RN Kundaji, RK Shyamasundar - Theoretical computer science, 2006 - Elsevier
In this paper, we show how refinement calculus provides a basis for translation validation of
optimized programs written in high level languages. Towards such a direction, we shall …

Malware: from modelling to practical detection

RK Shyamasundar, H Shah, NVN Kumar - Distributed Computing and …, 2010 - Springer
Malicious Software referred to as Malware refers to a software that has infiltrated to a
computer without the authorization of the computer (or the owner of the computer). Typical …

Modeling of alfa programs using pvs theorem prover

S Asokan, GS Kumar, NJ Lal - 2009 International Conference …, 2009 - ieeexplore.ieee.org
In Safety critical software failure can have a high price. Such software should be free of
errors before it is put into operation. Application of formal methods in the Software …

FDBG, the CLPFD Debugger Library of SICStus Prolog

D Hanák, T Szeredi, P Szeredi - ICLP, 2004 - books.google.com
Debugging tools serve an important role in software development. This also holds for
constraint programming and CLP (FD) in particular, where it is often necessary to observe …

Adding Optimization to the Decompilable Code Editor

S Ribić, A Salihbegović - 2010 Fifth International Conference …, 2010 - ieeexplore.ieee.org
The authors of this paper recently researched the possibility of developing programming
language implementation, that is neither compiler, nor interpreter. The concept is based on …

Malware: From Modelling to Practical Detection

A Pnueli - Distributed Computing and Internet Technology: 6th …, 2010 - Springer
Malicious Software referred to as Malware refers to a software that has infiltrated to a
computer without the authorization of the computer (or the owner of the computer). Typical …

Development of semantic debuggers based on refinement calculus

RN Kundaji, RK Shyamasundar - … 2004, Saint-Malo, France, September 6 …, 2004 - Springer
Translation validation based on refinement mappings has been effectively used for
validating compiled programs [1, 2]. Debugging programs is a very important stage in the …

[引用][C] Formal Verification of Safety Critical Software for Human in Space Programme

S Asokan - 2009