enter search term and/or author name
Programs from Proofs: A Framework for the Safe Execution of Untrusted Software
Marie-Christine Jakobs, Heike Wehrheim
Article No.: 7
Today, software is traded worldwide on global markets, with apps being downloaded to smartphones within minutes or seconds. This poses, more than ever, the challenge of ensuring safety of software in the face of (1) unknown or untrusted software...
Towards a Compiler for Reals
Eva Darulova, Viktor Kuncak
Article No.: 8
Numerical software, common in scientific computing or embedded systems, inevitably uses a finite-precision approximation of the real arithmetic in which most algorithms are designed. In many applications, the roundoff errors introduced by...
Newtonian Program Analysis via Tensor Product
Thomas Reps, Emma Turetsky, Prathmesh Prabhu
Article No.: 9
Recently, Esparza et al. generalized Newton’s method—a numerical-analysis algorithm for finding roots of real-valued functions—to a method for finding fixed-points of systems of equations over semirings. Their method provides a...