• CCASat

  • Referenced in 13 articles [sw12924]
  • Local search for Boolean satisfiability with configuration checking and subscore. This paper presents and analyzes ... proposing a local search strategy called configuration checking (CC) for SAT. The CC strategy results ... variable selection heuristic called configuration checking with aspiration (CCA). The CCA heuristic leads...
  • CCEHC

  • Referenced in 7 articles [sw36050]
  • variable selection mechanism focusing on configuration checking based only on hard clauses, a weighting scheme...
  • CCAnr

  • Referenced in 4 articles [sw40122]
  • CCAnr: a configuration checking based local search solver for non-random satisfiability. This paper presents ... CCAnr, which is based on the configuration checking strategy and has good performance ... variable according to the CCA (configuration checking with aspiration) heuristic if any; otherwise, it flips...
  • VeriFlow

  • Referenced in 6 articles [sw25229]
  • prone to bugs. Existing tools that check configuration files and data-plane state operate offline ... they arise. Is it possible to check network-wide invariants in real time...
  • SCCWalk

  • Referenced in 4 articles [sw32102]
  • main ideas in SCCWalk, including strong configuration checking (SCC) and walk perturbation ... variant of a powerful strategy called configuration checking for local search. The walk perturbation procedure...
  • FIREMAN

  • Referenced in 7 articles [sw10594]
  • treating firewall configurations as specialized programs, FIREMAN applies static analysis techniques to check misconfigurations, such ... firewalls. FIREMAN performs symbolic model checking of the firewall configurations for all possible IP packets ... finite state nature of firewall configurations. FIREMAN is implemented by modeling firewall rules using binary ... used successfully in hardware verification and model checking. We have experimented with FIREMAN and used...
  • WPDS++

  • Referenced in 3 articles [sw33482]
  • This paper presents a toolset for model checking x86 executables. The members of the toolset ... queries about the program’s possible control configurations...
  • ConfigChecker

  • Referenced in 1 article [sw28842]
  • behavior of access control configurations of the entire network including routers, IPSec, firewalls ... computation tree logic (CTL) and symbolic model checking to investigate all future and past states ... configurations that allows for general reachability and security property-based verification using CTL model checking ... ConfigChecker that integrates host and network configuration compliance checking in one model and allows...
  • OutlierFlag

  • Referenced in 2 articles [sw29471]
  • error check and standard deviation check. Several parameters are configurable so the algorithm...
  • SeismoStruct

  • Referenced in 4 articles [sw17671]
  • composite section configurations. The program has been extensively quality-checked and validated, as described...
  • ESBMC

  • Referenced in 8 articles [sw09946]
  • check multi-threaded software. ESBMC can be invoked through the command-line interface or configured...
  • Grade/CPN

  • Referenced in 1 article [sw09752]
  • Tools. The tool is extensible, configurable, and can check static and dynamic properties. It automatically...
  • JTorX

  • Referenced in 5 articles [sw01419]
  • installation, configuration and usage. And by integrating additional functionality, next to testing: checking...
  • Checkstyle

  • Referenced in 6 articles [sw10473]
  • coding standard. It automates the process of checking Java code to spare humans of this ... enforce a coding standard. Checkstyle is highly configurable and can be made to support almost...
  • tox

  • Referenced in 3 articles [sw33388]
  • command line tool. you can use for: checking your package installs correctly with different Python ... your tests in each of the environments, configuring your test tool of choice; acting...
  • Rehearsal

  • Referenced in 1 article [sw40688]
  • cope, thousands of organizations use system configuration languages to manage their computing infrastructure. Of these ... system. Puppet already performs some basic static checks, but they only prevent a narrow range ... problem with Puppet is that configurations can be non-deterministic. This paper presents Rehearsal ... verification tool for Puppet configurations. Rehearsal implements a sound, complete, and scalable determinacy analysis...
  • SIMP

  • Referenced in 2 articles [sw09936]
  • checking whether or not a safety property φ (that specifies that an unsafe configuration cannot...
  • ASPIER

  • Referenced in 6 articles [sw09852]
  • iterative abstraction-refinement methodology for software model checking with a domain-specific protocol and symbolic ... protocol implementation - the handshake in OpenSSL - for configurations consisting of up to 3 servers...
  • OntCheck

  • Referenced in 1 article [sw07143]
  • static checking methods, the ontology-based method we proposed is model-externally configurable and thus...
  • jiant

  • Referenced in 2 articles [sw36054]
  • transfer learning for sentence understanding tasks. Check out the blog post here. A few things ... want to know about jiant: jiant is configuration-driven. You can run an enormous variety...