enter search term and/or author name
Don’t Sit on the Fence: A Static Analysis Approach to Automatic Fence Insertion
Jade Alglave, Daniel Kroening, Vincent Nimal, Daniel Poetzl
Article No.: 6
Modern architectures rely on memory fences to prevent undesired weakenings of memory consistency. As the fences’ semantics may be subtle, the automation of their placement is highly desirable. But precise methods for restoring consistency do...
Programs from Proofs: A Framework for the Safe Execution of Untrusted Software
Marie-Christine Jakobs, Heike Wehrheim
Article No.: 7
Today, software is traded worldwide on global markets, with apps being downloaded to smartphones within minutes or seconds. This poses, more than ever, the challenge of ensuring safety of software in the face of (1) unknown or untrusted software...
Numerical software, common in scientific computing or embedded systems, inevitably uses a finite-precision approximation of the real arithmetic in which most algorithms are designed. In many applications, the roundoff errors introduced by...
Recently, Esparza et al. generalized Newton’s method—a numerical-analysis algorithm for finding roots of real-valued functions—to a method for finding fixed-points of systems of equations over semirings. Their method provides a...