Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
skip to main content
Volume 36, Issue 2June 2024Current Issue
Reflects downloads up to 27 Aug 2024Bibliometrics
Skip Table Of Content Section
research-article
Open Access
State Machines for Large Scale Computer Software and Systems
Article No.: 8, Pages 1–23https://doi.org/10.1145/3633786

The behavior and architecture of large scale discrete state systems found in computer software and hardware can be specified and analyzed using a particular class of primitive recursive functions. This article begins with an illustration of the utility of ...

research-article
Open Access
Modeling and Verification of Natural Language Requirements based on States and Modes
Article No.: 9, Pages 1–47https://doi.org/10.1145/3640822

The relationship between states (status of a system) and modes (capabilities of a system) used to describe system requirements is often poorly defined. The unclear relationship could make systems of interest out of control because of the out of boundaries ...

research-article
Open Access
The Universality of Functions in the Sciences at Large and in Computing
Article No.: 10, Pages 1–23https://doi.org/10.1145/3649154

Universality of a concept here means wide conceptual and practical usefulness in mathematics and applications. The function concept owes its universality to simplicity, generality, and powerful algebraic properties. Advantages proven in the sciences at ...

research-article
Open Access
Polymorphic dynamic programming by algebraic shortcut fusion
Article No.: 11, Pages 1–32https://doi.org/10.1145/3664828

Dynamic programming (DP) is a broadly applicable algorithmic design paradigm for the efficient, exact solution of otherwise intractable, combinatorial problems. However, the design of such algorithms is often presented informally in an ad-hoc manner. It ...

research-article
Open Access
FuSeBMC v4: Improving Code Coverage with Smart Seeds via BMC, Fuzzing and Static Analysis
Article No.: 12, Pages 1–25https://doi.org/10.1145/3665337

Bounded model checking (BMC) and fuzzing techniques are among the most effective methods for detecting errors and security vulnerabilities in software. However, there are still shortcomings in detecting these errors due to the inability of existing ...

research-article
Open Access
Specification and Verification of Multi-Clock Systems Using a Temporal Logic with Clock Constraints
Article No.: 13, Pages 1–51https://doi.org/10.1145/3670794

The polychronous or multi-clock paradigm is adequate to model large distributed systems where achieving a full timed synchronization is not only very costly but also often not necessary. It concerns systems made of a set of components with loose ...

Subjects

Comments