Verifying Heap-Manipulating Programs with Unknown Procedure Calls.
Shengchao QinChenguang LuoGuanhua HeFlorin CraciunWei-Ngan ChinPublished in: ICFEM (2010)
Keyphrases
- real world
- data structure
- provably correct
- data sets
- model checking
- information technology
- genetic algorithm
- artificial neural networks
- decision making
- similarity measure
- hidden markov models
- relational databases
- multi agent systems
- optimal solution
- database
- image sequences
- computer vision
- social networks
- machine learning
- real time