-
2
-
-
35048840320
-
Zing: A model checker for concurrent software
-
LNCS 3114
-
T. Andrews, S. Qadeer, S.K. Rajamani, J. Rehof, and Y. Xie. Zing: A model checker for concurrent software. In Proc. CAV'04, LNCS 3114: 484-487, 2004.
-
(2004)
Proc. CAV'04
, pp. 484-487
-
-
Andrews, T.1
Qadeer, S.2
Rajamani, S.K.3
Rehof, J.4
Xie, Y.5
-
5
-
-
84879543945
-
Model checking of unrestricted hierarchical state machines
-
LNCS 2076
-
M. Benedikt, P. Godefroid, and T. Reps. Model checking of unrestricted hierarchical state machines. In Proc. ICALP '01, LNCS 2076: 652-666, 2001.
-
(2001)
Proc. ICALP '01
, pp. 652-666
-
-
Benedikt, M.1
Godefroid, P.2
Reps, T.3
-
6
-
-
0000785347
-
Reachability analysis of pushdown automata: Applications to model checking
-
LNCS 1243
-
A. Boujjani, J. Esparza, and O. Maler. Reachability analysis of pushdown automata: Applications to model checking. In CONCUR'97, LNCS 1243, 1997.
-
(1997)
CONCUR'97
-
-
Boujjani, A.1
Esparza, J.2
Maler, O.3
-
7
-
-
0042499501
-
Model checking the full modal mu-calculus for infinite sequential processes
-
O. Burkart and B. Steffen. Model checking the full modal mu-calculus for infinite sequential processes. Theoretical Computer Science, 221:251-270, 1999.
-
(1999)
Theoretical Computer Science
, vol.221
, pp. 251-270
-
-
Burkart, O.1
Steffen, B.2
-
8
-
-
0033697422
-
Bandera: Extracting finite-state models from Java source code
-
J.C. Corbett, M.B. Dwyer, J. Hatcliff, S. Laubach, C.S. Pasareanu, Robby, and H. Zheng. Bandera: Extracting finite-state models from Java source code. In Proc. of Intl. Conf. on Software Engg., pages 439-448. 2000.
-
(2000)
Proc. of Intl. Conf. on Software Engg.
, pp. 439-448
-
-
Corbett, J.C.1
Dwyer, M.B.2
Hatcliff, J.3
Laubach, S.4
Pasareanu, C.S.5
Robby6
Zheng, H.7
-
9
-
-
0001107626
-
Memory efficient algorithms for the verification of temporal properties
-
C. Courcoubetis, M.Y. Vardi, P. Wolper, and M. Yannakakis. Memory efficient algorithms for the verification of temporal properties. Formal Methods in System Design, 1:275-288, 1992.
-
(1992)
Formal Methods in System Design
, vol.1
, pp. 275-288
-
-
Courcoubetis, C.1
Vardi, M.Y.2
Wolper, P.3
Yannakakis, M.4
-
10
-
-
0001801746
-
Protocol verification as a hardware design aid
-
D.L. Dill, A.J. Drexler, A.J. Hu, and C.H. Yang. Protocol verification as a hardware design aid. In IEEE International Conference on Computer Design: VLSI in Computers and Processors, pages 522-525, 1992.
-
(1992)
IEEE International Conference on Computer Design: VLSI in Computers and Processors
, pp. 522-525
-
-
Dill, D.L.1
Drexler, A.J.2
Hu, A.J.3
Yang, C.H.4
-
11
-
-
0001905232
-
Checking system rules using systemspecific, programmer-written compiler extensions
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using systemspecific, programmer-written compiler extensions. In Proc. 4th USENIX OSDI, pages 1-16, 2000.
-
(2000)
Proc. 4th USENIX OSDI
, pp. 1-16
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
12
-
-
84944409009
-
Efficient algorithms for model checking pushdown systems
-
LNCS 1855. Springer
-
J. Esparza, D. Hansel, P. Rossmanith, and S. Schwoon. Efficient algorithms for model checking pushdown systems. In Computer Aided Verification, 12th International Conference, LNCS 1855, pages 232-247. Springer, 2000.
-
(2000)
Computer Aided Verification, 12th International Conference
, pp. 232-247
-
-
Esparza, J.1
Hansel, D.2
Rossmanith, P.3
Schwoon, S.4
-
14
-
-
0031630370
-
Partial online cycle elimination in inclusion constraint graphs
-
M. Fähndrich, J.S. Foster, Z. Su, and A. Aiken. Partial online cycle elimination in inclusion constraint graphs. Proc. PLDI '98, pages 85-96, 1998.
-
(1998)
Proc. PLDI '98
, pp. 85-96
-
-
Fähndrich, M.1
Foster, J.S.2
Su, Z.3
Aiken, A.4
-
15
-
-
0003246762
-
A direct symbolic approach to model checking pushdown systems
-
Proc. Workshop on Verification of Infinite State Systems, Elsevier
-
A. Finkel, B. Willems, and P. Wolper. A direct symbolic approach to model checking pushdown systems. In Proc. Workshop on Verification of Infinite State Systems, volume 9 of Electronic Notes in Theor. Comp. Sci. Elsevier, 1997.
-
(1997)
Electronic Notes in Theor. Comp. Sci.
, vol.9
-
-
Finkel, A.1
Willems, B.2
Wolper, P.3
-
16
-
-
0033735089
-
Path-based depth-first search for strong and biconnected components
-
H. Gabow. Path-based depth-first search for strong and biconnected components. Inf. Process. Lett., 74(3-4):107-114, 2000.
-
(2000)
Inf. Process. Lett.
, vol.74
, Issue.3-4
, pp. 107-114
-
-
Gabow, H.1
-
17
-
-
84937567800
-
Temporal-safety proofs for systems code
-
LNCS 2404
-
T.A. Henzinger, R. Jhala, R. Majumdar, G.C. Necula, G. Sutre, and W. Weimer. Temporal-safety proofs for systems code. In CAV 02: Proc. of 14th Conf. on Computer Aided Verification, LNCS 2404, pages 526-538, 2002.
-
(2002)
CAV 02: Proc. of 14th Conf. on Computer Aided Verification
, pp. 526-538
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Necula, G.C.4
Sutre, G.5
Weimer, W.6
-
19
-
-
4444341636
-
Online cycle detection and difference propagation for pointer analysis
-
D.J. Pearce, P.H.J. Kelly, and C. Hankin. Online cycle detection and difference propagation for pointer analysis. Software Quality Journal, 12(4):311-337, 2004.
-
(2004)
Software Quality Journal
, vol.12
, Issue.4
, pp. 311-337
-
-
Pearce, D.J.1
Kelly, P.H.J.2
Hankin, C.3
-
20
-
-
0029180939
-
Precise interprocedural dataflow analysis via graph reachability
-
T. Reps, S. Horwitz, and M. Sagiv. Precise interprocedural dataflow analysis via graph reachability. POPL '95, pages 49-61, 1995.
-
(1995)
POPL '95
, pp. 49-61
-
-
Reps, T.1
Horwitz, S.2
Sagiv, M.3
|