-
1
-
-
34547488263
-
-
M. Abramowitz and I. A. Stegun. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. Dover, New York, ninth Dover printing, tenth GPO printing edition, 1964.
-
M. Abramowitz and I. A. Stegun. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. Dover, New York, ninth Dover printing, tenth GPO printing edition, 1964.
-
-
-
-
2
-
-
0000359296
-
A minimum-distance error-correcting parser for context-free languages
-
Dec
-
A. V. Aho and T. G. Peterson. A minimum-distance error-correcting parser for context-free languages. SIAM Journal of Computation, 1(4):305-312, Dec. 1972.
-
(1972)
SIAM Journal of Computation
, vol.1
, Issue.4
, pp. 305-312
-
-
Aho, A.V.1
Peterson, T.G.2
-
6
-
-
1442339050
-
From symptom to cause: Localizing errors in counterexample traces
-
T. Ball, M. Naik, and S. K. Rajamani. From symptom to cause: localizing errors in counterexample traces. SIGPLAN Not., 38(1):97-105, 2003.
-
(2003)
SIGPLAN Not
, vol.38
, Issue.1
, pp. 97-105
-
-
Ball, T.1
Naik, M.2
Rajamani, S.K.3
-
7
-
-
84894630000
-
Automatically validating temporal safety properties of interfaces
-
SPIN 2001, Workshop on Model Checking of Software, of, May
-
T. Ball and S. K. Rajamani. Automatically validating temporal safety properties of interfaces. In SPIN 2001, Workshop on Model Checking of Software, volume 2057 of Lecture Notes in Computer Science, pages 103-122, May 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2057
, pp. 103-122
-
-
Ball, T.1
Rajamani, S.K.2
-
8
-
-
0034507852
-
Path analysis and renaming for predicated instruction scheduling
-
L. Carter, B. Simon, B. Calder, L. Carter, and J. Ferrante. Path analysis and renaming for predicated instruction scheduling. International Journal of Parallel Programming, 28(6):563-588, 2000.
-
(2000)
International Journal of Parallel Programming
, vol.28
, Issue.6
, pp. 563-588
-
-
Carter, L.1
Simon, B.2
Calder, B.3
Carter, L.4
Ferrante, J.5
-
9
-
-
20344391954
-
Explaining abstract counterexamples
-
New York, NY, USA, ACM Press
-
S. Chaki, A. Groce, and O. Strichman. Explaining abstract counterexamples. In Foundations of Software Engineering (FSE), pages 73-82, New York, NY, USA, 2004. ACM Press.
-
(2004)
Foundations of Software Engineering (FSE)
, pp. 73-82
-
-
Chaki, S.1
Groce, A.2
Strichman, O.3
-
10
-
-
25644452721
-
Model checking one million lines of C code
-
San Diego, CA, Feb
-
H. Chen, D. Dean, and D. Wagner. Model checking one million lines of C code. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2004.
-
(2004)
Network and Distributed System Security Symposium (NDSS)
-
-
Chen, H.1
Dean, D.2
Wagner, D.3
-
11
-
-
0029238629
-
Efficient generation of counterexamples and witnesses in symbolic model checking
-
New York, NY, USA, ACM Press
-
E. M. Clarke, O. Grumberg, K. L. McMillan, and X. Zhao. Efficient generation of counterexamples and witnesses in symbolic model checking. In Conference on Design Automation (DAC), pages 427-432, New York, NY, USA, 1995. ACM Press.
-
(1995)
Conference on Design Automation (DAC)
, pp. 427-432
-
-
Clarke, E.M.1
Grumberg, O.2
McMillan, K.L.3
Zhao, X.4
-
12
-
-
0033716154
-
Bandera: A source-level interface for model checking java programs
-
New York, NY, USA, ACM Press
-
J. C. Corbett, M. B. Dwyer, J. Hatcliff, and Robby. Bandera: a source-level interface for model checking java programs. In International Conference on Software Engineering (ICSE), pages 762-765, New York, NY, USA, 2000. ACM Press.
-
(2000)
International Conference on Software Engineering (ICSE)
, pp. 762-765
-
-
Corbett, J.C.1
Dwyer, M.B.2
Hatcliff, J.3
Robby4
-
13
-
-
34547464020
-
Character counts: Cheater detection is relaxed for honest individuals
-
Salt Lake City, Utah, June
-
L. Cosmides, J. Tooby, A. Montaldi, and N. Thrall. Character counts: Cheater detection is relaxed for honest individuals. In 11th Annual Meeting of the Human Behavior and Evolution Society, Salt Lake City, Utah, June 1999.
-
(1999)
11th Annual Meeting of the Human Behavior and Evolution Society
-
-
Cosmides, L.1
Tooby, J.2
Montaldi, A.3
Thrall, N.4
-
14
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
October
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems, 13(4):451-490, October 1991.
-
(1991)
ACM Transactions on Programming Languages and Systems
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
15
-
-
0034448966
-
Unification-based pointer analysis with directional assignments
-
New York, NY, USA, ACM Press
-
M. Das. Unification-based pointer analysis with directional assignments. In Programming Language Design and Implementation (PLDI), pages 35-46, New York, NY, USA, 2000. ACM Press.
-
(2000)
Programming Language Design and Implementation (PLDI)
, pp. 35-46
-
-
Das, M.1
-
16
-
-
0036040604
-
ESP: Path-sensitive program, verification in polynomial
-
time
-
M. Das, S. Lerner, and M. Seigle. ESP: path-sensitive program, verification in polynomial time. SIGPLAN Notices, 37(5):57-68, 2002.
-
(2002)
SIGPLAN Notices
, vol.37
, Issue.5
, pp. 57-68
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
17
-
-
0029322476
-
Comparison of syntactic error handling in LR parsers
-
P. Degano and C. Priami. Comparison of syntactic error handling in LR parsers. Software ?Practice and Experience, 25(6):657-679, 1995.
-
(1995)
Software ?Practice and Experience
, vol.25
, Issue.6
, pp. 657-679
-
-
Degano, P.1
Priami, C.2
-
19
-
-
24944448541
-
Simplify: A theorem prover for program checking
-
D. Detlefs, G. Nelson, and J. B. Saxe. Simplify: a theorem prover for program checking. J. ACM, 52(3):365-473, 2005.
-
(2005)
J. ACM
, vol.52
, Issue.3
, pp. 365-473
-
-
Detlefs, D.1
Nelson, G.2
Saxe, J.B.3
-
20
-
-
0030192589
-
Explaining type inference
-
D. Duggan and F. Bent. Explaining type inference. Sci. Comput. Program., 27(1):37-83, 1996.
-
(1996)
Sci. Comput. Program
, vol.27
, Issue.1
, pp. 37-83
-
-
Duggan, D.1
Bent, F.2
-
21
-
-
34547436127
-
-
P. Eggert, M. Haertel, D. Hayes, R. Stallman, and L. Tower. diff - compare files line by line. In http://www.gnu.org/software/diffutils/ diffutils.html, 2005.
-
P. Eggert, M. Haertel, D. Hayes, R. Stallman, and L. Tower. diff - compare files line by line. In http://www.gnu.org/software/diffutils/ diffutils.html, 2005.
-
-
-
-
22
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In Symposium on Operating Systems Design and Implementation, 2000.
-
(2000)
Symposium on Operating Systems Design and Implementation
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
23
-
-
0036036098
-
Extended static checking for java
-
New York, NY, USA, ACM Press
-
C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, and R. Stata. Extended static checking for java. In Programming Language Design and Implementation (PLDI), pages 234-245, New York, NY, USA, 2002. ACM Press.
-
(2002)
Programming Language Design and Implementation (PLDI)
, pp. 234-245
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
25
-
-
0026856799
-
Domain-specific reasoning: Social contracts, cheating and perspective change
-
G. Gigerenzer and K. Hug. Domain-specific reasoning: social contracts, cheating and perspective change. In Cognition, volume 43, pages 127-171, 1992.
-
(1992)
Cognition
, vol.43
, pp. 127-171
-
-
Gigerenzer, G.1
Hug, K.2
-
26
-
-
35048873252
-
Error explanation with distance metrics
-
Jan
-
A. Groce. Error explanation with distance metrics. In Lecture Notes in Computer Science, volume 2988, pages 108-122, Jan. 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2988
, pp. 108-122
-
-
Groce, A.1
-
28
-
-
35248845029
-
What went wrong: Explaining counterexamples
-
Jan
-
A. Groce and W. Visser. What went wrong: Explaining counterexamples. In Lecture Notes in Computer Science, volume 2648, pages 121-135, Jan. 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2648
, pp. 121-135
-
-
Groce, A.1
Visser, W.2
-
29
-
-
0036041563
-
Lazy abstraction
-
T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Lazy abstraction. In Principles of Programming Languages (POPL), pages 58-70, 2002.
-
(2002)
Principles of Programming Languages (POPL)
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
30
-
-
79951744451
-
Finding bugs is easy
-
New York, NY, USA, ACM Press
-
D. Hovemeyer and W. Pugh. Finding bugs is easy. In Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications (OOPSLA), pages 132-136, New York, NY, USA, 2004. ACM Press.
-
(2004)
Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications (OOPSLA)
, pp. 132-136
-
-
Hovemeyer, D.1
Pugh, W.2
-
31
-
-
31844452965
-
Path slicing
-
New York, NY, USA, ACM Press
-
R. Jhala and R. Majumdar. Path slicing. In Programming Language Design and Implementation (PLDI), pages 38-47, New York, NY, USA, 2005. ACM Press.
-
(2005)
Programming Language Design and Implementation (PLDI)
, pp. 38-47
-
-
Jhala, R.1
Majumdar, R.2
-
32
-
-
0022129301
-
Depth-first iterative deepening: An optimal admissible tree search
-
Sept
-
R. E. Korf. Depth-first iterative deepening: an optimal admissible tree search. Artificial Intelligence, 27(1):97-109, Sept. 1985.
-
(1985)
Artificial Intelligence
, vol.27
, Issue.1
, pp. 97-109
-
-
Korf, R.E.1
-
33
-
-
20344404753
-
Correlation exploitation in error ranking
-
New York, NY, USA, ACM Press
-
T. Kremenek, K. Ashcraft, J. Yang, and D. Engler. Correlation exploitation in error ranking. In Foundations of Software Engineering (FSE), pages 83-93, New York, NY, USA, 2004. ACM Press.
-
(2004)
Foundations of Software Engineering (FSE)
, pp. 83-93
-
-
Kremenek, T.1
Ashcraft, K.2
Yang, J.3
Engler, D.4
-
34
-
-
35248882461
-
Z-ranking: Using statistical analysis o counter the impact of static analysis approximations
-
Jan
-
T. Kremenek and D. Engler. Z-ranking: Using statistical analysis o counter the impact of static analysis approximations. In Static Analysis, 10th International Symposium (SAS), pages 295-315, Jan. 2003.
-
(2003)
Static Analysis, 10th International Symposium (SAS)
, pp. 295-315
-
-
Kremenek, T.1
Engler, D.2
-
35
-
-
13144267779
-
Generating error traces from verification-condition counterexamples
-
Mar
-
K. R. M. Leino, T. Millstein, and J. B. Saxe. Generating error traces from verification-condition counterexamples. In Science of Computer Programming, volume 55, pages 209-226, Mar. 2005.
-
(2005)
Science of Computer Programming
, vol.55
, pp. 209-226
-
-
Leino, K.R.M.1
Millstein, T.2
Saxe, J.B.3
-
36
-
-
84976654685
-
Fast text search allowing errors
-
U. Manber and S. Wu. Fast text search allowing errors. Communications of the ACM, 35(10):83-91, 1992.
-
(1992)
Communications of the ACM
, vol.35
, Issue.10
, pp. 83-91
-
-
Manber, U.1
Wu, S.2
-
37
-
-
20344382538
-
Pse: Explaining program, failures via postmortem static analysis
-
R. N. Taylor, editor, ACM, nov
-
R. Manevich, M. Sridharan, S. Adams, M. Das, and Z. Yang. Pse: Explaining program, failures via postmortem static analysis. In R. N. Taylor, editor, Foundations of Software Engineering (FSE). ACM, nov 2004.
-
(2004)
Foundations of Software Engineering (FSE)
-
-
Manevich, R.1
Sridharan, M.2
Adams, S.3
Das, M.4
Yang, Z.5
-
38
-
-
24644512501
-
A new foundation for control-dependence and slicing for modern program structures
-
Jan
-
V. P. Ranganath, T. Amtoft, A. Banerjee, M. B. Dwyer, and J. Hatcliff. A new foundation for control-dependence and slicing for modern program structures. In European Symposium on Programming (ESOP), pages 77-93, Jan. 2005.
-
(2005)
European Symposium on Programming (ESOP)
, pp. 77-93
-
-
Ranganath, V.P.1
Amtoft, T.2
Banerjee, A.3
Dwyer, M.B.4
Hatcliff, J.5
-
39
-
-
0036036579
-
Efficient path conditions in dependence graphs
-
New York, NY, USA, ACM Press
-
T. Robschink and G. Snelting. Efficient path conditions in dependence graphs. In International Conference on Software Engineering (ICSE), pages 478-488, New York, NY, USA, 2002. ACM Press.
-
(2002)
International Conference on Software Engineering (ICSE)
, pp. 478-488
-
-
Robschink, T.1
Snelting, G.2
-
40
-
-
85084164620
-
Detecting format string vulnerabilities with, type qualifiers
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with, type qualifiers. In USENIX Security Symposium, pages 201-220, 2001.
-
(2001)
USENIX Security Symposium
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
42
-
-
0037580003
-
A slicing-based approach for locating type errors
-
F. Tip and T. B. Dinesh. A slicing-based approach for locating type errors. ACM Trans. Softw. Eng. Methodol, 10(1):5-55, 2001.
-
(2001)
ACM Trans. Softw. Eng. Methodol
, vol.10
, Issue.1
, pp. 5-55
-
-
Tip, F.1
Dinesh, T.B.2
-
43
-
-
17044367450
-
Finding and preventing run-time error handling mistakes
-
Vancouver, British Columbia, Canada, Oct
-
W. Weimer and G. Necula. Finding and preventing run-time error handling mistakes. In ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, Vancouver, British Columbia, Canada, Oct. 2004.
-
(2004)
ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications
-
-
Weimer, W.1
Necula, G.2
-
45
-
-
34247116992
-
Perracotta: Mining temporal API rules from imperfect traces
-
New York, NY, USA, ACM Press
-
J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta: mining temporal API rules from imperfect traces. In ICSE '06: Proceeding of the 28th international conference on Software engineering, pages 282-291, New York, NY, USA, 2006. ACM Press.
-
(2006)
ICSE '06: Proceeding of the 28th international conference on Software engineering
, pp. 282-291
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
|