-
4
-
-
0038716510
-
Points-to analysis using BDDs
-
M. Berndl, O. Lhoták, F. Qian, L. Hendren, and N. Umanee. Points-to analysis using BDDs. In Proceedings of PLDI, pages 103-114, 2003.
-
(2003)
Proceedings of PLDI
, pp. 103-114
-
-
Berndl, M.1
Lhoták, O.2
Qian, F.3
Hendren, L.4
Umanee, N.5
-
5
-
-
0030246260
-
Improving the variable ordering of OBDDs is NP-complete
-
B. Bollig and I. Wegener. Improving the variable ordering of OBDDs is NP-complete. IEEE Trans. Comput, 45(9):993-1002, 1996.
-
(1996)
IEEE Trans. Comput
, vol.45
, Issue.9
, pp. 993-1002
-
-
Bollig, B.1
Wegener, I.2
-
6
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
R. E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput., 35(8):677-691, 1986.
-
(1986)
IEEE Trans. Comput
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
8
-
-
34247119284
-
Dynamically discovering likely interface invariants
-
C. Csallner and Y. Smaragdakis. Dynamically discovering likely interface invariants. In Proceedings of'ICSE, pages 861-864, 2006.
-
(2006)
Proceedings of'ICSE
, pp. 861-864
-
-
Csallner, C.1
Smaragdakis, Y.2
-
11
-
-
0033698745
-
Quickly detecting relevant program invariants
-
M. D. Ernst, A. Czeisler, W. G. Griswold, and D. Notkin. Quickly detecting relevant program invariants. In Proceedings of ICSE, pages 449-458, 2000.
-
(2000)
Proceedings of ICSE
, pp. 449-458
-
-
Ernst, M.D.1
Czeisler, A.2
Griswold, W.G.3
Notkin, D.4
-
12
-
-
0036036098
-
Extended static checking for Java
-
C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, and R. Stata. Extended static checking for Java. In Proceedings of PLDI, pages 234-245, 2002.
-
(2002)
Proceedings of PLDI
, pp. 234-245
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
13
-
-
0036038345
-
Tracking down software bugs using automatic anomaly detection
-
S. Hangal and M. S. Lam. Tracking down software bugs using automatic anomaly detection. In Proceedings of'ICSE, pages 291-301, 2002.
-
(2002)
Proceedings of'ICSE
, pp. 291-301
-
-
Hangal, S.1
Lam, M.S.2
-
16
-
-
77949371828
-
From uncertainty to belief: Inferring the specification within
-
T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From uncertainty to belief: inferring the specification within. In USENIX'06: Proceedings of the 7th conference on USENIX Symposium on Operating Systems Design and Implementation, pages 12-12, 2006.
-
(2006)
USENIX'06: Proceedings of the 7th conference on USENIX Symposium on Operating Systems Design and Implementation
, pp. 12-12
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.4
Engler, D.5
-
17
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In Proceedings of ESEC/FSE-13, pages 306-315, 2005.
-
(2005)
Proceedings of ESEC/FSE-13
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
20
-
-
34548219459
-
Static specification mining using automata-based abstractions
-
S. Shoham, E. Yahav, S. Fink, and M. Pistoia. Static specification mining using automata-based abstractions. In Proceedings of ISSTA, pages 174-184, 2007.
-
(2007)
Proceedings of ISSTA
, pp. 174-184
-
-
Shoham, S.1
Yahav, E.2
Fink, S.3
Pistoia, M.4
-
21
-
-
24644493674
-
Mining temporal specifications for error detection
-
W. Weimer and G. Necula. Mining temporal specifications for error detection. In Proceedings of TACAS, pages 461-476, 2005.
-
(2005)
Proceedings of TACAS
, pp. 461-476
-
-
Weimer, W.1
Necula, G.2
-
22
-
-
8344251741
-
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
-
J. Whaley and M. S. Lam. Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In Proceedings of PLDI, pages 131-144, 2004.
-
(2004)
Proceedings of PLDI
, pp. 131-144
-
-
Whaley, J.1
Lam, M.S.2
-
25
-
-
34247116992
-
Perracotta: Mining temporal API rules from imperfect traces
-
J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta: Mining temporal API rules from imperfect traces. In Proceedings of ICSE, pages 282-291, 2006.
-
(2006)
Proceedings of ICSE
, pp. 282-291
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
-
26
-
-
4544331311
-
Efficient forward computation of dynamic slices using reduced ordered binary decision diagrams
-
X. Zhang, R. Gupta, and Y. Zhang. Efficient forward computation of dynamic slices using reduced ordered binary decision diagrams. In Proceedings of ICSE, 2004.
-
(2004)
Proceedings of ICSE
-
-
Zhang, X.1
Gupta, R.2
Zhang, Y.3
|