-
2
-
-
0033226029
-
Introduction to set constraint-based program analysis
-
A. Aiken. Introduction to set constraint-based program analysis. Science of Computer Programming, 35(2-3):79-111, 1999.
-
(1999)
Science of Computer Programming
, vol.35
, Issue.2-3
, pp. 79-111
-
-
Aiken, A.1
-
5
-
-
0036040604
-
ESP: Path-sensitive program verification in polynomial time
-
M. Das, S. Lerner, and M. Seigle. ESP: Path-sensitive program verification in polynomial time. In PLDI 2002 [13], pages 57-68.
-
(2002)
PLDI
, Issue.13
, pp. 57-68
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
8
-
-
35248866218
-
Typestate verification: Abstraction techniques and complexity results
-
Springer-Verlag, Berlin
-
J. Field, D. Goyal, G. Ramalingam, and E. Yahav. Typestate verification: Abstraction techniques and complexity results. In Proceedings of the 10th International Static Analysis Symposium, volume 2694 of LNCS, pages 439-462. Springer-Verlag, Berlin, 2003.
-
(2003)
Proceedings of the 10th International Static Analysis Symposium, Volume 2694 of LNCS
, vol.2694
, pp. 439-462
-
-
Field, J.1
Goyal, D.2
Ramalingam, G.3
Yahav, E.4
-
10
-
-
0036039794
-
A system and language for uilding system-specific, static analyses
-
S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language for uilding system-specific, static analyses. In PLDI 2002 [13].
-
(2002)
PLDI
, Issue.13
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
11
-
-
84988311171
-
Set constraints and set-based analysis
-
Springer-Verlag, Berlin
-
N. Heintze and J. Jaffar. Set constraints and set-based analysis. In Proceedings of the 2nd International Workshop on Principles and Practice of Constraint Programming, volume 874 of LNCS, pages 281-298. Springer-Verlag, Berlin, 1994.
-
(1994)
Proceedings of the 2nd International Workshop on Principles and Practice of Constraint Programming, Volume 874 of LNCS
, vol.874
, pp. 281-298
-
-
Heintze, N.1
Jaffar, J.2
-
12
-
-
84959040988
-
Solving regular path queries
-
Springer-Verlag, Berlin
-
Y. A. Liu and F. Yu. Solving regular path queries. In Proceedings of the 6th International Conference on Mathematics of Program Construction, volume 2386 of LNCS, pages 195-208. Springer-Verlag, Berlin, 2002.
-
(2002)
Proceedings of the 6th International Conference on Mathematics of Program Construction, Volume 2386 of LNCS
, vol.2386
, pp. 195-208
-
-
Liu, Y.A.1
Yu, F.2
-
15
-
-
84976758332
-
An automatic technique for the selection of data representations in SETL programs
-
Apr.
-
E. Schonberg, J. Schwartz, and M. Sharir. An automatic technique for the selection of data representations in SETL programs. ACM Trans. Program. Lang. Syst., 3(2): 126-143, Apr. 1981.
-
(1981)
ACM Trans. Program. Lang. Syst.
, vol.3
, Issue.2
, pp. 126-143
-
-
Schonberg, E.1
Schwartz, J.2
Sharir, M.3
-
16
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proceedings of the USENIX Security Symposium, pages 63-78, 1999.
-
(1999)
Proceedings of the USENIX Security Symposium
, pp. 63-78
-
-
Sekar, R.1
Uppuluri, P.2
-
18
-
-
85009827121
-
Data flow analysis as model checking
-
A. M. T. Ito, editor, Springer-Verlag, Berlin
-
B. Steffen. Data flow analysis as model checking. In A. M. T. Ito, editor, Theoretical Aspects of Computer Science (TAGS'91), volume 526 of LNCS, pages 346-364. Springer-Verlag, Berlin, 1991.
-
(1991)
Theoretical Aspects of Computer Science (TAGS'91), Volume 526 of LNCS
, vol.526
, pp. 346-364
-
-
Steffen, B.1
|