-
1
-
-
70350342625
-
A finite semantics of simply-typed lambda terms for infinite runs of automata
-
K. Aehlig. A finite semantics of simply-typed lambda terms for infinite runs of automata. Logical Methods in Computer Science, 3(3), 2007.
-
(2007)
Logical Methods in Computer Science
, vol.3
, Issue.3
-
-
Aehlig, K.1
-
2
-
-
24944481687
-
The monadic second order theory of trees given by arbitrary level-two recursion schemes is decidable
-
Springer-Verlag
-
K. Aehlig, J. G. de Miranda, and C.-H. L. Ong. The monadic second order theory of trees given by arbitrary level-two recursion schemes is decidable. In TLCA 2005, volume 3461 of Lecture Notes in Computer Science, pages 39-54. Springer-Verlag, 2005.
-
(2005)
TLCA 2005, Volume 3461 of Lecture Notes in Computer Science
, pp. 39-54
-
-
Aehlig, K.1
Miranda, J.G.D.2
Ong, C.-H.L.3
-
3
-
-
35248891044
-
Precise analysis of string expressions
-
Springer-Verlag
-
A. S. Christensen, A. Møller, and M. I. Schwartzbach. Precise analysis of string expressions. In Static Analysis, 10th International Symposium, SAS 2003, volume 2694 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, 2003.
-
(2003)
Static Analysis, 10th International Symposium, SAS 2003, Volume 2694 of Lecture Notes in Computer Science
, pp. 1-18
-
-
Christensen, A.S.1
Møller, A.2
Schwartzbach, M.I.3
-
4
-
-
0002497705
-
The io- and oi-hierarchies
-
W. Dam. The io- and oi-hierarchies. Theoretical Computer Science, 20:95-207, 1982.
-
(1982)
The Oretical Computer Science
, vol.20
, pp. 95-207
-
-
Dam, W.1
-
6
-
-
0042283028
-
A comparison of pebble tree transducers with macro tree transducers
-
J. Engelfriet and S. Maneth. A comparison of pebble tree transducers with macro tree transducers. Acta Inf., 39(9):613-698, 2003.
-
(2003)
Acta Inf
, vol.39
, Issue.9
, pp. 613-698
-
-
Engelfriet, J.1
Maneth, S.2
-
8
-
-
0024096653
-
High level tree transducers and iterated pushdown tree transducers
-
J. Engelfriet and H. Vogler. High level tree transducers and iterated pushdown tree transducers. Acta Inf., 26(1/2):131-192, 1988.
-
(1988)
Acta Inf
, vol.26
, Issue.1-2
, pp. 131-192
-
-
Engelfriet, J.1
Vogler, H.2
-
11
-
-
51549119988
-
Collapsible pushdown automata and recursion schemes
-
IEEE Computer Society
-
M. Hague, A. Murawski, C.-H. L. Ong, and O. Serre. Collapsible pushdown automata and recursion schemes. In Proceedings of 23rd Annual IEEE Symposium on Logic in Computer Science, pages 452-461. IEEE Computer Society, 2008.
-
(2008)
Proceedings of 23rd Annual IEEE Symposium on Logic in Computer Science
, pp. 452-461
-
-
Hague, M.1
Murawski, A.2
Ong, C.-H.L.3
Serre, O.4
-
12
-
-
77952407110
-
Amnesia: Analysis and monitoring for neutralizing sql-injection attacks
-
New York, NY, USA, ACM
-
W. G. J. Halfond and A. Orso. Amnesia: analysis and monitoring for neutralizing sql-injection attacks. In ASE '05: Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering, pages 174-183, New York, NY, USA, 2005. ACM.
-
(2005)
ASE '05: Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering
, pp. 174-183
-
-
Halfond, W.G.J.1
Orso, A.2
-
13
-
-
0030709171
-
Tupling calculation eliminates multiple data traversals
-
Z. Hu, H. Iwasaki, M. Takeichi, and A. Takano. Tupling calculation eliminates multiple data traversals. In Proceedings of International Conference on Functional Programming, pages 164-175, 1997.
-
(1997)
Proceedings of International Conference on Functional Programming
, pp. 164-175
-
-
Hu, Z.1
Iwasaki, H.2
Takeichi, M.3
Takano, A.4
-
15
-
-
33745934031
-
Precise alias analysis for static detection of web application vulnerabilities
-
PLAS 2006 - Proceedings of the 2006 Programming Languages and Analysis for Security Workshop
-
N. Jovanovic, C. Kruegel, and E. Kirda. Precise alias analysis for static detection of web application vulnerabilities. In PLAS '06: Proceedings of the 2006 workshop on Programming languages and analysis for security, pages 27-36, New York, NY, USA, 2006. ACM. (Pubitemid 44059944)
-
(2006)
PLAS 2006 - Proceedings of the 2006 Programming Languages and Analysis for Security Workshop
, vol.2006
, pp. 27-36
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
16
-
-
84888857398
-
Deciding monadic theories of hyperalgebraic trees
-
Springer-Verlag
-
T. Knapik, D. Niwinski, and P. Urzyczyn. Deciding monadic theories of hyperalgebraic trees. In TLCA 2001, volume 2044 of Lecture Notes in Computer Science, pages 253-267. Springer-Verlag, 2001.
-
(2001)
TLCA 2001, Volume 2044 of Lecture Notes in Computer Science
, pp. 253-267
-
-
Knapik, T.1
Niwinski, D.2
Urzyczyn, P.3
-
17
-
-
84948946239
-
Higher-order pushdown trees are easy
-
Springer-Verlag
-
T. Knapik, D. Niwinski, and P. Urzyczyn. Higher-order pushdown trees are easy. In FoSSaCS 2002, volume 2303 of Lecture Notes in Computer Science, pages 205-222. Springer-Verlag, 2002.
-
(2002)
FoSSaCS 2002, Volume 2303 of Lecture Notes in Computer Science
, pp. 205-222
-
-
Knapik, T.1
Niwinski, D.2
Urzyczyn, P.3
-
18
-
-
70450225396
-
Model-checking higher-order functions
-
ACM Press
-
N. Kobayashi. Model-checking higher-order functions. In Proceedings of PPDP 2009. ACM Press, 2009.
-
(2009)
Proceedings of PPDP 2009
-
-
Kobayashi, N.1
-
19
-
-
77149161352
-
-
N. Kobayashi. TRECS. http://www.kb.ecei.tohoku.ac.jp/~koba/trecs/, 2009
-
(2009)
TRECS
-
-
Kobayashi, N.1
-
22
-
-
70350599810
-
A type system equivalent to themodal mu-calculus model checking of higher-order recursion schemes
-
IEEE Computer Society Press
-
N. Kobayashi and C.-H. L. Ong. A type system equivalent to themodal mu-calculus model checking of higher-order recursion schemes. In Proceedings of LICS 2009, pages 179-188. IEEE Computer Society Press, 2009.
-
(2009)
Proceedings of LICS 2009
, pp. 179-188
-
-
Kobayashi, N.1
Ong, C.-H.L.2
-
24
-
-
44949151587
-
Reducing unnecessary conservativeness in access rights analysis with string analysis
-
Washington, DC, USA, IEEE Computer Society
-
M. Koganeyama, N. Tabuchi, and T. Tateishi. Reducing unnecessary conservativeness in access rights analysis with string analysis. In APSEC '07: Proceedings of the 14th Asia-Pacific Software Engineering Conference, pages 438-445, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
APSEC '07: Proceedings of the 14th Asia-Pacific Software Engineering Conference
, pp. 438-445
-
-
Koganeyama, M.1
Tabuchi, N.2
Tateishi, T.3
-
25
-
-
33244476060
-
XML type checking with macro tree transducers
-
S. Maneth, A. Berlea, T. Perst, and H. Seidl. XML type checking with macro tree transducers. In Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 2005), pages 283-294, 2005.
-
(2005)
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems PODS 2005
, pp. 283-294
-
-
Maneth, S.1
Berlea, A.2
Perst, T.3
Seidl, H.4
-
27
-
-
84878740286
-
Exact XML type checking in polynomial time
-
Springer-Verlag
-
S. Maneth, T. Perst, and H. Seidl. Exact XML type checking in polynomial time. In ICDT 2007, volume 4353 of Lecture Notes in Computer Science, pages 254-268. Springer-Verlag, 2007.
-
(2007)
ICDT 2007, Volume 4353 of Lecture Notes in Computer Science
, pp. 254-268
-
-
Maneth, S.1
Perst, T.2
Seidl, H.3
-
28
-
-
0038266967
-
Typechecking for XML transformers
-
T. Milo, D. Suciu, and V. Vianu. Typechecking for XML transformers. J. Comput. Syst. Sci., 66(1):66-97, 2003.
-
(2003)
J. Comput. Syst. Sci
, vol.66
, Issue.1
, pp. 66-97
-
-
Milo, T.1
Suciu, D.2
Vianu, V.3
-
32
-
-
34547348202
-
On model-checking trees generated by higher-order recursion schemes
-
IEEE Computer Society Press
-
C.-H. L. Ong. On model-checking trees generated by higher-order recursion schemes. In LICS 2006, pages 81-90. IEEE Computer Society Press, 2006.
-
(2006)
LICS 2006
, pp. 81-90
-
-
Ong, C.-H.L.1
-
33
-
-
65049083334
-
Improving static resolution of dynamic class loading in java using dynamically gathered environment information
-
J. Sawin and A. Rountev. Improving static resolution of dynamic class loading in java using dynamically gathered environment information. Automated Software Engg., 16(2):357-381, 2009.
-
(2009)
Automated Software Engg
, vol.16
, Issue.2
, pp. 357-381
-
-
Sawin, J.1
Rountev, A.2
-
35
-
-
77149145439
-
An infinite hierarchy of term languages - An approach to mathematical complexity
-
R. Turner. An infinite hierarchy of term languages - an approach to mathematical complexity. In Proceedings of ICALP, pages 593-608, 1972.
-
(1972)
Proceedings of ICALP
, pp. 593-608
-
-
Turner, R.1
-
36
-
-
0025444759
-
Deforestation: Transforming programs to eliminate trees
-
P. Wadler. Deforestation: Transforming programs to eliminate trees. Theoretical Computer Science, 73(2):231-248, 1990.
-
(1990)
Theoretical Computer Science
, vol.73
, Issue.2
, pp. 231-248
-
-
Wadler, P.1
-
38
-
-
57349153984
-
Static detection of cross-site scripting vulnerabilities
-
New York, NY, USA, ACM
-
G. Wassermann and Z. Su. Static detection of cross-site scripting vulnerabilities. In ICSE '08: Proceedings of the 30th international conference on Software engineering, pages 171-180, New York, NY, USA, 2008. ACM.
-
(2008)
ICSE '08: Proceedings of the 30th International Conference on Software Engineering
, pp. 171-180
-
-
Wassermann, G.1
Su, Z.2
|