-
1
-
-
0001751689
-
The essence of constraint propagation
-
June
-
K.R. Apt. The essence of constraint propagation. Theoretical Computer Science, 221(1-2): 179-210, June 1999.
-
(1999)
Theoretical Computer Science
, vol.221
, Issue.1-2
, pp. 179-210
-
-
Apt, K.R.1
-
2
-
-
0013398527
-
The role of commutativity in constraint propagation algorithms
-
K.R. Apt. The role of commutativity in constraint propagation algorithms. ACM Transactions on Programming Languages and Systems, 22(6):1002-1036, 2000.
-
(2000)
ACM Transactions on Programming Languages and Systems
, vol.22
, Issue.6
, pp. 1002-1036
-
-
Apt, K.R.1
-
3
-
-
0005388318
-
A polynomial time algorithm for solving systems of linear inequalities with two variables per inequality
-
B. Aspvall and Y. Shiloach. A polynomial time algorithm for solving systems of linear inequalities with two variables per inequality. SIAM Journal on Computing, 9(4):827-845, 1980.
-
(1980)
SIAM Journal on Computing
, vol.9
, Issue.4
, pp. 827-845
-
-
Aspvall, B.1
Shiloach, Y.2
-
4
-
-
0031185563
-
Applying interval arithmetic to real, integer, and Boolean constraints
-
July
-
F. Benhamou and W.J. Older. Applying interval arithmetic to real, integer, and Boolean constraints. Journal of Logic Programming, 32(1):1-24, July 1997.
-
(1997)
Journal of Logic Programming
, vol.32
, Issue.1
, pp. 1-24
-
-
Benhamou, F.1
Older, W.J.2
-
5
-
-
0344839461
-
The Sup-Inf method in Presburger arithmetic
-
University of Texas Math Dept., December
-
W.W. Bledsoe. The Sup-Inf method in Presburger arithmetic. Technical report, University of Texas Math Dept., December 1974.
-
(1974)
Technical Report
-
-
Bledsoe, W.W.1
-
7
-
-
0029218616
-
Symbolic range propagation
-
Los Alamitos, CA, USA, April 1995. IEEE Computer Society Press.
-
W. Blume and R. Eigenmann. Symbolic range propagation. In Proceedings of the 9th International Symposium on Parallel Processing (IPPS'95, pages 357-363, Los Alamitos, CA, USA, April 1995. IEEE Computer Society Press.
-
Proceedings of the 9th International Symposium on Parallel Processing IPPS'95
, pp. 357-363
-
-
Blume, W.1
Eigenmann, R.2
-
8
-
-
84947916935
-
Diophantine equations, Presburger arithmetic and finite automata. in
-
Springer-Verlag
-
A. Boudet and H. Comon. Diophantine equations, Presburger arithmetic and finite automata. In Proceedings of Trees in Algebra and Programming (CAAP'96), volume 1059 of Lecture Notes in Computer Science, pages 30-43. Springer-Verlag, 1996.
-
(1996)
Proceedings of Trees in Algebra and Programming (CAAP'96), Volume 1059 of Lecture Notes in Computer Science
, vol.1059
, pp. 30-43
-
-
Boudet, A.1
Comon, H.2
-
11
-
-
85050550846
-
Interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proceedings of the 4th ACM Symposium on Principles of Programming Languages, pages 234-252, 1977.
-
(1977)
Proceedings of the 4th ACM Symposium on Principles of Programming Languages
-
-
Cousot, P.1
Cousot, R.2
-
14
-
-
0033226105
-
A faster solver for general systems of equations
-
November
-
C. Fecht and H. Seidl. A faster solver for general systems of equations. Science of Computer Programming, 35(2-3):137-161, November 1999.
-
(1999)
Science of Computer Programming
, vol.35
, Issue.2-3
, pp. 137-161
-
-
Fecht, C.1
Seidl, H.2
-
16
-
-
0027568719
-
Optimizing array bound checks using flow analysis
-
March-December
-
R. Gupta. Optimizing array bound checks using flow analysis. ACM Letters on Programming Languages and Systems, 1(4):135-150, March-December 1994.
-
(1994)
ACM Letters on Programming Languages and Systems
, vol.1
, Issue.4
, pp. 135-150
-
-
Gupta, R.1
-
21
-
-
84976706502
-
Global data flow analysis and iterative algorithms
-
January
-
J.B. Kam and J.D. Ullman. Global data flow analysis and iterative algorithms. Journal of the ACM, 23(1):158-171, January 1976.
-
(1976)
Journal of the ACM
, vol.23
, Issue.1
, pp. 158-171
-
-
Kam, J.B.1
Ullman, J.D.2
-
22
-
-
0040599941
-
-
R. E. Miller and J. W. Thatcher, editors, Plenum Press, New York
-
R.M. Karp. Reducibility among combinatorial problems. In R. E. Miller and J. W. Thatcher, editors, Complexity of Computer Computations, pages 85-103. Plenum Press, New York, 1975.
-
(1975)
Reducibility among combinatorial problems
, pp. 85-103
-
-
Karp, R.M.1
-
24
-
-
77956959215
-
On recursive unsolvability of Hilbert's Tenth Problem
-
Patrick Suppes et al., editors, Amsterdam, North-Holland.
-
Y.V. Matijaseviĉ. On recursive unsolvability of Hilbert's Tenth Problem. In Patrick Suppes et al., editors, Logic, Methodology and Philosophy of Science IV, volume 74 of Studies in Logic and the Foundations of Mathematics, pages 89-110, Amsterdam, 1973. North-Holland.
-
(1973)
Logic, Methodology and Philosophy of Science IV, Volume 74 of Studies in Logic and the Foundations of Mathematics
, vol.74
, pp. 89-110
-
-
Matijaseviĉ, Y.V.1
-
25
-
-
0004293209
-
-
Prentice-Hall, Englewood Cliffs, NJ, New York
-
R.E. Moore. Interval Analysis. Prentice-Hall, Englewood Cliffs, NJ, New York, 1963.
-
(1963)
Interval Analysis.
-
-
Moore, R.E.1
-
26
-
-
24444460134
-
log n algorithm for the two-variable-per-constraint linear programming sat-isfiability problem
-
Stanford University
-
log n algorithm for the two-variable-per- constraint linear programming sat-isfiability problem. Technical Report STAN-CS-78-689, Stanford University, 1978.
-
(1978)
Technical Report STAN-CS-78-689
-
-
Nelson, G.1
-
27
-
-
35048868288
-
Nelson Techniques For Program Verification G.
-
Xerox Palo Alto Research Center
-
G. Nelson. Techniques for program verification. Technical Report CSL-81-10, Xerox Palo Alto Research Center, 1981.
-
(1981)
Technical Report CSL-81-10
-
-
-
28
-
-
0008658655
-
Constraint arithmetic on real intervals
-
Frédéric Benhamou and Alain Colmerauer, editors, MIT Press
-
W.J. Older and A. Velino. Constraint arithmetic on real intervals. In Frédéric Benhamou and Alain Colmerauer, editors, Constraint Logic Programming: Selected Research, pages 175-196. MIT Press, 1993.
-
(1993)
Constraint Logic Programming: Selected Research
, pp. 175-196
-
-
Older, W.J.1
Velino, A.2
-
29
-
-
0040620594
-
Efficient and precise array access analysis
-
Y. Paek, J. Hoeflinger, and D.A. Padua. Efficient and precise array access analysis. ACM Transactions on Programming Languages and Systems, 24(1):65-109, 2002.
-
(2002)
ACM Transactions on Programming Languages and Systems
, vol.24
, Issue.1
, pp. 65-109
-
-
Paek, Y.1
Hoeflinger, J.2
Padua, D.A.3
-
31
-
-
84976676720
-
The omega test: A fast and practical integer programming algorithm for dependence analysis
-
August
-
W. Pugh. The omega test: a fast and practical integer programming algorithm for dependence analysis. Communications of the ACM, 35(8):102-114, August 1992.
-
(1992)
Communications of the ACM
, vol.35
, Issue.8
, pp. 102-114
-
-
Pugh, W.1
-
34
-
-
0019621772
-
Deciding linear inequalities by computing loop residues
-
October
-
R. Shostak. Deciding linear inequalities by computing loop residues. Journal of the ACM, 28(4):769-779, October 1981.
-
(1981)
Journal of the ACM
, vol.28
, Issue.4
, pp. 769-779
-
-
Shostak, R.1
-
35
-
-
35048868285
-
Implementation of an array bound checker
-
Los Angeles, California, January 17-19, ACM SIGACT-SIGPLAN.
-
N. Suzuki and K. Ishihata. Implementation of an array bound checker. In Conference Record of the Fourth ACM Symposium on Principles of Programming Languages, pages 132-143, Los Angeles, California, January 17-19, 1977. ACM SIGACT-SIGPLAN.
-
(1977)
Conference Record of the Fourth ACM Symposium on Principles of Programming Languages
, pp. 132-143
-
-
Suzuki, N.1
Ishihata, K.2
-
36
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
San Diego, CA, February Internet Society.
-
D. Wagner, J.S. Foster, E.A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Symposium on Network and Distributed Systems Security (NDSS '00), pages 3-17, San Diego, CA, February 2000. Internet Society.
-
(2000)
Symposium on Network and Distributed Systems Security (NDSS '00)
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
37
-
-
84955609913
-
An automata-theoretic approach to presburger arithmetic constraints
-
P. Wolper and B. Boigelot. An automata-theoretic approach to presburger arithmetic constraints. In Static Analysis Symposium, pages 21-32, 1995.
-
(1995)
Static Analysis Symposium
, pp. 21-32
-
-
Wolper, P.1
Boigelot, B.2
|