-
1
-
-
84941162011
-
Better static memory management: Improving region-based analysis of higher-order languages
-
A. Aiken, M. Fähndrich, and R. Levien. Better Static Memory Management: Improving Region-Based Analysis of Higher-Order Languages. In PLDI, 1995.
-
(1995)
PLDI
-
-
Aiken, A.1
Fähndrich, M.2
Levien, R.3
-
2
-
-
0036039066
-
The SLAM project: Debugging system software via static analysis
-
T. Ball and S. Rajamani. The SLAM Project: Debugging System Software via Static Analysis. In POPL, 2002.
-
(2002)
POPL
-
-
Ball, T.1
Rajamani, S.2
-
3
-
-
0038601527
-
Modular verification of software components in C
-
S. Chaki, E. Clarke, A. Groce, S. Jha, and H. Veith. Modular Verification of Software Components in C. In ICSE, 2003.
-
(2003)
ICSE
-
-
Chaki, S.1
Clarke, E.2
Groce, A.3
Jha, S.4
Veith, H.5
-
5
-
-
0036040604
-
ESP: Path-sensitive program verification in polynomial time
-
M. Das, S. Lerner, and M. Seigle. ESP: Path-Sensitive Program Verification in Polynomial Time. In PLDI, 2002.
-
(2002)
PLDI
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
6
-
-
0034826554
-
Enforcing high-level protocols in low-level software
-
R. DeLine and M. Fähndrich. Enforcing High-Level Protocols in Low-Level Software. In PLDI, 2001.
-
(2001)
PLDI
-
-
DeLine, R.1
Fähndrich, M.2
-
7
-
-
23744483521
-
Software validation via scalable path-sensitive value flow analysis
-
N. Dor, S. Adams, M. Das, and Z. Yang. Software Validation via Scalable Path-Sensitive Value Flow Analysis. In ISSTA, 2004.
-
(2004)
ISSTA
-
-
Dor, N.1
Adams, S.2
Das, M.3
Yang, Z.4
-
8
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. In OSDI, 2000.
-
(2000)
OSDI
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
10
-
-
33646730661
-
Typestate verification: Abstraction techniques and complexity result
-
J. Field, D.Goyal, G.Ramalingam, and E.Yahav. Typestate Verification: Abstraction Techniques and Complexity Result. In SAS, 2003.
-
(2003)
SAS
-
-
Field, J.1
Goyal, D.2
Ramalingam, G.3
Yahav, E.4
-
11
-
-
0000423444
-
Object types against races
-
C. Flanagan and M. Abadi. Object Types Against Races. In CONCUR, 1999.
-
(1999)
CONCUR
-
-
Flanagan, C.1
Abadi, M.2
-
12
-
-
33646729837
-
Types for safe locking
-
C. Flanagan and M. Abadi. Types for Safe Locking. In ESOP, 1999.
-
(1999)
ESOP
-
-
Flanagan, C.1
Abadi, M.2
-
13
-
-
0036036098
-
Extended static checking for Java
-
C. Flanagan, K. Leino, M. Lillibridge, G. Nelson, J. Saxe, and R. State. Extended Static Checking for Java. In PLDI, 2002.
-
(2002)
PLDI
-
-
Flanagan, C.1
Leino, K.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.5
State, R.6
-
15
-
-
0000877763
-
The type system for object initialization in the Java bytecode language
-
November
-
S. Freund and J. Mitchell. The Type System for Object Initialization in the Java Bytecode Language. TOPLAS, 21(6):1196-1250, November 1999.
-
(1999)
TOPLAS
, vol.21
, Issue.6
, pp. 1196-1250
-
-
Freund, S.1
Mitchell, J.2
-
19
-
-
0032664647
-
Quasi-linear types
-
N. Kobayashi. Quasi-Linear Types. In POPL, 1999.
-
(1999)
POPL
-
-
Kobayashi, N.1
-
20
-
-
0141762593
-
Time regions and effects for resource usage analysis
-
N. Kobayashi. Time Regions and Effects for Resource Usage Analysis. In TLDI, 2003.
-
(2003)
TLDI
-
-
Kobayashi, N.1
-
21
-
-
0037209761
-
A type system for JVM threads
-
January
-
C. Laneve. A Type System for JVM Threads. Theoretical Computer Science, 290(1):741-778, January 2003.
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 741-778
-
-
Laneve, C.1
-
22
-
-
33646722825
-
Inserting safe memory reuse commands into ML-like programs
-
O. Lee, H. Yang, and K. Yi. Inserting Safe Memory Reuse Commands into ML-like Programs. In SAS, 2003.
-
(2003)
SAS
-
-
Lee, O.1
Yang, H.2
Yi, K.3
-
23
-
-
0034852165
-
Chaff: Engineering an efficient SAT solver
-
M. Moskewicz, C. Madigan, Y. Zhao, L. Zhang, and S. Malik. Chaff: Engineering an Efficient SAT Solver. In DAC, 2001.
-
(2001)
DAC
-
-
Moskewicz, M.1
Madigan, C.2
Zhao, Y.3
Zhang, L.4
Malik, S.5
-
24
-
-
33646748450
-
The effects of the precision of pointer analysis
-
M. Shapiro and S. Horwitz. The Effects of the Precision of Pointer Analysis. In SAS, 1997.
-
(1997)
SAS
-
-
Shapiro, M.1
Horwitz, S.2
-
27
-
-
0022605097
-
Typestate: A programming language concept for enhancing software reliability
-
January
-
R. Strom and S. Yemini. Typestate: A Programming Language Concept for Enhancing Software Reliability. IEEE Transactions on Software Engineering, 12(1):157-171, January 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.1
, pp. 157-171
-
-
Strom, R.1
Yemini, S.2
-
28
-
-
33646750920
-
Enforcing resource usage protocols via scoped methods
-
G. Tan, X. Ou, and D. Walker. Enforcing Resource Usage Protocols via Scoped Methods. In FOOL, 2003.
-
(2003)
FOOL
-
-
Tan, G.1
Ou, X.2
Walker, D.3
-
29
-
-
0032108162
-
A region inference algorithm
-
July
-
M. Tofte and L. Birkedal. A Region Inference Algorithm. TOPLAS, 20(4):734-767, July 1998.
-
(1998)
TOPLAS
, vol.20
, Issue.4
, pp. 734-767
-
-
Tofte, M.1
Birkedal, L.2
-
30
-
-
0000189545
-
Typed memory management via static capabilities
-
July
-
D. Walker, K. Crary, and G. Morriset. Typed Memory Management via Static Capabilities. TOPLAS, 22(4):701-771, July 2000.
-
(2000)
TOPLAS
, vol.22
, Issue.4
, pp. 701-771
-
-
Walker, D.1
Crary, K.2
Morriset, G.3
-
31
-
-
17044371129
-
Scalable error detection using boolean satisfiability
-
Y. Xie and A. Aiken. Scalable Error Detection using Boolean Satisfiability. In POPL, pages 351-363, 2005.
-
(2005)
POPL
, pp. 351-363
-
-
Xie, Y.1
Aiken, A.2
|