Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
ReSG: A Data Structure for Verification of Majority-based In-memory Computing on ReRAM Crossbars
ACM Transactions on Embedded Computing Systems (TECS), Volume 23, Issue 6Article No.: 90, Pages 1–24https://doi.org/10.1145/3615358Recent advancements in the fabrication of Resistive Random Access Memory (ReRAM) devices have led to the development of large-scale crossbar structures. In-memory computing architectures relying on ReRAM crossbars aim to mitigate the processor-memory ...
- ArticleAugust 2024
Verifying and Interpreting Neural Networks Using Finite Automata
AbstractVerifying properties and interpreting the behaviour of deep neural networks (DNN) is an important task given their ubiquitous use in applications, including safety-critical ones, and their black-box nature. We propose an automata-theoretic ...
- ArticleJuly 2024
Collective Contracts for Message-Passing Parallel Programs
AbstractProcedure contracts are a well-known approach for specifying programs in a modular way. We investigate a new contract theory for collective procedures in parallel message-passing programs. As in the sequential setting, one can verify that a ...
- research-articleJuly 2024
Verifying Unboundedness via Amalgamation
LICS '24: Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer ScienceJuly 2024, Article No.: 4, Pages 1–15https://doi.org/10.1145/3661814.3662133Well-structured transition systems (WSTS) are an abstract family of systems that encompasses a vast landscape of infinite-state systems. By requiring a well-quasi-ordering (wqo) on the set of states, a WSTS enables generic algorithms for classic ...
- ArticleJune 2024
-
- short-paperJune 2024
SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data
SACMAT 2024: Proceedings of the 29th ACM Symposium on Access Control Models and TechnologiesJune 2024, Pages 53–58https://doi.org/10.1145/3649158.3657050Data oversharing is a critical issue in today's technologically driven society. Numerous entities, i.e., corporations, governments, criminal groups, are collecting individuals' data. One potential cause is that current systems, such as verification ...
- posterJuly 2024
Meta-Configuration Tracking for Machine-Certified Correctness of Concurrent Data Structures (Abstract)
HOPC'24: Proceedings of the 2024 ACM Workshop on Highlights of Parallel ComputingJune 2024, Pages 21–22https://doi.org/10.1145/3670684.3673406We introduce meta-configuration tracking: a simple, universal, sound, and complete proof method for producing machine-verifiable proofs of linearizability. Universality means that our method works for any object type; soundness means that an algorithm ...
- research-articleJune 2024
Log Diameter Rounds MST Verification and Sensitivity in MPC
SPAA '24: Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and ArchitecturesJune 2024, Pages 269–280https://doi.org/10.1145/3626183.3659984We consider two natural variants of the problem of minimum spanning tree (MST) of a graph in the parallel setting: MST verification (verifying if a given tree is an MST) and the sensitivity analysis of an MST (finding the lowest cost replacement edge for ...
- research-articleJune 2024
A Systematic Process to Engineer Dependable Integration of Frame-based Input Devices in a Multimodal Input Chain: Application to Rehabilitation in Healthcare
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue EICSArticle No.: 259, Pages 1–31https://doi.org/10.1145/3664633Designing new input devices and associated interaction techniques is a key contribution in order to increase the bandwidth between users and interactive applications. In the field of Human-Computer Interaction, research and development services in ...
- research-articleJune 2024
Experimental evaluation of a machine learning approach to improve the reproducibility of network simulations
Simulation (SIMU), Volume 100, Issue 6Jun 2024, Pages 545–561https://doi.org/10.1177/00375497241229753A stochastic network simulation is verified when its distribution of outputs is aligned with the ground truth, while tolerating deviations due to variability in real-world measurements and the randomness of a stochastic simulation. However, comparing ...
- ArticleMay 2024
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing
Advances in Cryptology – EUROCRYPT 2024May 2024, Pages 63–93https://doi.org/10.1007/978-3-031-58716-0_3AbstractWe optimise the verification of the SQIsign signature scheme. By using field extensions in the signing procedure, we are able to significantly increase the amount of available rational 2-power torsion in verification, which achieves a significant ...
- research-articleMay 2024
Dungeons & Deepfakes: Using scenario-based role-play to study journalists' behavior towards using AI-based verification tools for video content
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsMay 2024, Article No.: 776, Pages 1–17https://doi.org/10.1145/3613904.3641973The evolving landscape of manipulated media, including the threat of deepfakes, has made information verification a daunting challenge for journalists. Technologists have developed tools to detect deepfakes, but these tools can sometimes yield ...
- research-articleMay 2024
Multimodal Pretrained Models for Verifiable Sequential Decision-Making: Planning, Grounding, and Perception
AAMAS '24: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent SystemsMay 2024, Pages 2011–2019Recently developed pretrained models can encode rich world knowledge expressed in multiple modalities, such as text and images. However, the outputs of these models cannot be integrated into algorithms to solve sequential decision-making tasks. We ...
- research-articleApril 2024
Scenario-Based Proofs for Concurrent Objects
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue OOPSLA1Article No.: 140, Pages 1294–1323https://doi.org/10.1145/3649857Concurrent objects form the foundation of many applications that exploit multicore architectures and their importance has lead to informal correctness arguments, as well as formal proof systems. Correctness arguments (as found in the distributed ...
- research-articleApril 2024
Models for Storage in Database Backends
PaPoC '24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed DataApril 2024, Pages 58–66https://doi.org/10.1145/3642976.3653036This paper describes ongoing work on developing a formal specification of a database backend. We present the formalisation of the expected behaviour of a basic transactional system that calls into a simple store API, and instantiate in two semantic ...
- research-articleApril 2024
Simplifying Snapshot Isolation: A New Definition, Equivalence, and Efficient Checking
PaPoC '24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed DataApril 2024, Pages 23–29https://doi.org/10.1145/3642976.3653032Snapshot Isolation (SI) is a popular isolation level, supported by many databases and is widely used by applications. Understanding and checking SI is essential. However, today's SI definitions can be obscure for non-experts to understand, or inefficient ...
- research-articleSeptember 2024
Knowledge-Augmented Mutation-Based Bug Localization for Hardware Design Code
ACM Transactions on Architecture and Code Optimization (TACO), Volume 21, Issue 3Article No.: 45, Pages 1–26https://doi.org/10.1145/3660526Verification of hardware design code is crucial for the quality assurance of hardware products. Being an indispensable part of verification, localizing bugs in the hardware design code is significant for hardware development but is often regarded as a ...
- posterJune 2024
Trustworthy AI: Industry-Guided Tooling of the Methods
CAIN '24: Proceedings of the IEEE/ACM 3rd International Conference on AI Engineering - Software Engineering for AIApril 2024, Pages 245–246https://doi.org/10.1145/3644815.3644970The need to assess and validate the trustworthiness of AI (robustness, transparency, safety, security, etc.,) has been the subject of considerable academic work for some time now. A natural evolution of such research efforts is to have a tangible impact ...
Verifying Opacity of Discrete-Timed Automata
FormaliSE '24: Proceedings of the 2024 IEEE/ACM 12th International Conference on Formal Methods in Software Engineering (FormaliSE)April 2024, Pages 55–65https://doi.org/10.1145/3644033.3644376Opacity is a powerful confidentiality property that holds if a system cannot leak secret information through observable behavior. In recent years, time has become an increasingly popular attack vector. The notion of opacity has therefore been extended to ...
- research-articleMay 2024
TPV: A Tool for Validating Temporal Properties in UML Class Diagrams
ICSE-Companion '24: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion ProceedingsApril 2024, Pages 114–118https://doi.org/10.1145/3639478.3640044Software scientists and practitioners have criticized Model-driven engineering (MDE) for lacking effective tooling. Although progress has been made, most MDE analysis tools rely on complex, heavyweight mathematical techniques that are not based on UML. ...