-
2
-
-
0040026563
-
A generalization of the differential approach to recursive query evaluation
-
I. Balbin, and K. Ramamohanarao A generalization of the differential approach to recursive query evaluation Journal of Logic Programming 4 1987 259 262
-
(1987)
Journal of Logic Programming
, vol.4
, pp. 259-262
-
-
Balbin, I.1
Ramamohanarao, K.2
-
3
-
-
1442264340
-
Points-to analysis using BDDs
-
Berndl, M., O. Lhoták, F. Qian, L. J. Hendren and N. Umanee, Points-to analysis using BDDs, in: PLDI, 2003, pp. 103-114.
-
(2003)
PLDI
, pp. 103-114
-
-
M. Berndl1
-
4
-
-
24144452823
-
Static validation of security protocols
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H.R. Nielson Static validation of security protocols Journal of Computer Security 13 2005 347 390
-
(2005)
Journal of Computer Security
, vol.13
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.R.5
-
5
-
-
0026913667
-
Symbolic boolean manipulation with ordered binary-decision diagrams
-
R.E. Bryant Symbolic boolean manipulation with ordered binary-decision diagrams ACM Comput. Surv. 24 1992 293 318
-
(1992)
ACM Comput. Surv.
, vol.24
, pp. 293-318
-
-
Bryant, R.E.1
-
6
-
-
84976681791
-
Computable queries for relational data bases (preliminary report)
-
Chandra, A. K. and D. Harel, Computable queries for relational data bases (preliminary report), in: STOC, 1979, pp. 309-318.
-
(1979)
STOC
, pp. 309-318
-
-
Chandra, A.K.1
Harel, D.2
-
8
-
-
1442356980
-
Propagating differences: An efficient new fixpoint algorithm for distributive constraint systems
-
C. Fecht, and H. Seidl Propagating differences: An efficient new fixpoint algorithm for distributive constraint systems Nordic Journal of Computing 5 1998 304 329
-
(1998)
Nordic Journal of Computing
, vol.5
, pp. 304-329
-
-
Fecht, C.1
Seidl, H.2
-
9
-
-
33745797496
-
Data-flow analysis as model checking within the jABC
-
Lamprecht, A.-L., T. Margaria and B. Steffen, Data-flow analysis as model checking within the jABC, in: CC, 2006, pp. 101-104.
-
(2006)
CC
, pp. 101-104
-
-
Lamprecht, A.-L.1
Margaria, T.2
Steffen, B.3
-
12
-
-
77951440429
-
Model checking is static analysis of modal logic
-
Nielson, F. and H. R. Nielson, Model checking is static analysis of modal logic, in: FOSSACS, 2010, pp. 191-205.
-
(2010)
FOSSACS
, pp. 191-205
-
-
Nielson, F.1
Nielson, H.R.2
-
13
-
-
21144454095
-
The succinct solver suite
-
Nielson, F., H. R. Nielson, H. Sun, M. Buchholtz, R. R. Hansen, H. Pilegaard and H. Seidl, The succinct solver suite, in: TACAS, 2004, pp. 251-265.
-
(2004)
TACAS
, pp. 251-265
-
-
Nielson, F.1
Nielson, H.R.2
Sun, H.3
Buchholtz, M.4
Hansen, R.R.5
Pilegaard, H.6
Seidl, H.7
-
15
-
-
0005252864
-
Symbolic finite differencing - Part i
-
LNCS
-
R. Paige Symbolic finite differencing - part i ESOP'90 LNCS vol. 432 1990 36 56
-
(1990)
ESOP'90
, vol.432
, pp. 36-56
-
-
Paige, R.1
-
16
-
-
0031701157
-
Data flow analysis is model checking of abstract interpretations
-
Schmidt, D. A., Data flow analysis is model checking of abstract interpretations, in: POPL, 1998, pp. 38-48.
-
(1998)
POPL
, pp. 38-48
-
-
Schmidt, D.A.1
-
17
-
-
84905008881
-
Program analysis as model checking of abstract interpretations
-
Schmidt, D. A. and B. Steffen, Program analysis as model checking of abstract interpretations, in: SAS, 1998, pp. 351-380.
-
(1998)
SAS
, pp. 351-380
-
-
Schmidt, D.A.1
Steffen, B.2
-
18
-
-
85009827121
-
Data flow analysis as model checking
-
Steffen, B., Data flow analysis as model checking, in: TACS, 1991, pp. 346-365.
-
(1991)
TACS
, pp. 346-365
-
-
Steffen, B.1
-
19
-
-
4544374465
-
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
-
Whaley, J. and M. S. Lam, Cloning-based context-sensitive pointer alias analysis using binary decision diagrams, in: PLDI, 2004, pp. 131-144.
-
(2004)
PLDI
, pp. 131-144
-
-
Whaley, J.1
Lam, M.S.2
|