114 results on '"Tom Melham"'
Search Results
2. Symbolic Task Inference in Deep Reinforcement Learning.
3. A Formal CHERI-C Semantics for Verification.
4. Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities.
5. Active Learning of Abstract System Models from Traces using Model Checking.
6. Enhancing active model learning with equivalence checking using simulation relations.
7. Exposing previously undetectable faults in deep neural networks.
8. End-to-End Formal Verification of a RISC-V Processor Extended with Capability Pointers.
9. DeepSynth: Automata Synthesis for Automatic Task Segmentation in Deep Reinforcement Learning.
10. A Formal CHERI-C Semantics for Verification.
11. Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters.
12. Automatic Heap Layout Manipulation for Exploitation.
13. Verification of tree-based hierarchical read-copy update in the Linux kernel.
14. Active Learning of Abstract System Models from Traces using Model Checking [Extended].
15. Lifting CDCL to Template-Based Abstract Domains for Program Verification.
16. Effective Verification for Low-Level Software with Competing Interrupts.
17. Hardware/Software Co-verification Using Path-based Symbolic Execution.
18. Semantic Adversarial Perturbations using Learnt Representations.
19. Learning Concise Models from Long Execution Traces.
20. Equivalence Checking of a Floating-Point Unit Against a High-Level C Model.
21. Unbounded safety verification for hardware using software analyzers.
22. Effective verification of low-level software with nested interrupts.
23. Equivalence Checking Using Trace Partitioning.
24. Hardware Verification Using Software Analyzers.
25. Generating Realistic Unrestricted Adversarial Inputs using Dual-Objective GAN Training.
26. CREST: Hardware Formal Verification with ANSI-C Reference Specifications.
27. DeepSynth: Program Synthesis for Automatic Task Segmentation in Deep Reinforcement Learning.
28. Generating test case chains for reactive systems.
29. Chaining Test Cases for Reactive System Testing.
30. Relational STE and theorem proving for formal verification of industrial circuit designs.
31. Formal co-validation of low-level hardware/software interfaces.
32. Assume-guarantee validation for STE properties within an SVA environment.
33. A Refinement Approach to Design and Verification of On-Chip Communication Protocols.
34. Equivalence Checking a Floating-point Unit against a High-level C Model (Extended Version).
35. Verification of the Tree-Based Hierarchical Read-Copy Update in the Linux Kernel.
36. Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities
37. On the Semantics of ReFLect as a Basis for a Reflective Theorem Prover.
38. Chaining Test Cases for Reactive System Testing (extended version).
39. Symbolic Trajectory Evaluation.
40. Recalibrating classifiers for interpretable abusive content detection
41. Verification of tree-based hierarchical read-copy update in the Linux kernel
42. Modelling, abstraction, and computation in systems biology: A view from computer science
43. Equivalence checking of a floating-point unit against a high-level C model
44. The PROSPER Toolkit
45. Interactive Proof Discovery: An Empirical Study of HOL Users
46. EDICT: An Environment for Design Using Integrated Circuit Tools
47. Five Axioms of Alpha−Conversion
48. Formally Analyzed Dynamic Synthesis of Hardware
49. A Package for Inductive Relation Definitions in HOL
50. Practical Formal Verification in Microprocessor Design
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.