-
1
-
-
35048856472
-
Resource control for synchronous cooperative threads
-
In P. Gardner and N. Yoshida, editors Springer-Verlag, August
-
R. Amadio and S. Dal Zilio. Resource Control for Synchronous Cooperative Threads. In P. Gardner and N. Yoshida, editors, Proceedings of CONCUR'04, volume 3170 of Lecture Notes in Computer Science, pages 68-82. Springer-Verlag, August 2004.
-
(2004)
Proceedings of CONCUR'04, Volume 3170 of Lecture Notes in Computer Science
, pp. 68-82
-
-
Amadio, R.1
Dal Zilio, S.2
-
3
-
-
24144488189
-
Mobile resource guarantees for smart devices
-
In G. Barthe, L. Burdy,M. Huisman, J.-L. Lanet, andT. Muntean, editors Springer-Verlag
-
D. Aspinall, S. Gilmore, M. Hofmann, D. Sannella, and I. Stark. Mobile Resource Guarantees for Smart Devices. In G. Barthe, L. Burdy,M. Huisman, J.-L. Lanet, andT. Muntean, editors,Proceedings ofCASSIS'04, volume 3362 of Lecture Notes in Computer Science, pages 1-27. Springer-Verlag, 2005.
-
(2005)
Proceedings ofCASSIS'04, Volume 3362 of Lecture Notes in Computer Science
, pp. 1-27
-
-
Aspinall, D.1
Gilmore, S.2
Hofmann, M.3
Sannella, D.4
Stark, I.5
-
4
-
-
4944265699
-
Secure information flow by self-composition
-
IEEE Press
-
G. Barthe, P. D'Argenio, and T. Rezk. Secure Information Flow by Self-Composition. In Proceedings of CSFW'04, pages 100-114. IEEE Press, 2004.
-
(2004)
Proceedings of CSFW'04
, pp. 100-114
-
-
Barthe, G.1
D'argenio, P.2
Rezk, T.3
-
5
-
-
84883303614
-
Synthesizing parametric specifications of dynamic memory utilization in object-oriented programs
-
To appear
-
V. Braberman, D. Garbervetsky, and S. Yovine. Synthesizing parametric specifications of dynamic memory utilization in object-oriented programs. In FTfJP'05, 2005. To appear.
-
(2005)
FTfJP'05
-
-
Braberman, V.1
Garbervetsky, D.2
Yovine, S.3
-
7
-
-
35248874920
-
Java applet correctness: A developer-oriented approach
-
In K. Araki, S. Gnesi, and D. Mandrioli, editors Springer-Verlag
-
L. Burdy, A. Requet, and J.-L. Lanet. Java Applet Correctness: a Developer-Oriented Approach. In K. Araki, S. Gnesi, and D. Mandrioli, editors, Proceedings of FME'03, volume 2805 ofLecture Notes inComputer Science, pages 422-439. Springer-Verlag, 2003.
-
(2003)
Proceedings of FME'03, Volume 2805 OfLecture Notes InComputer Science
, pp. 422-439
-
-
Burdy, L.1
Requet, A.2
Lanet, J.-L.3
-
8
-
-
26444548026
-
Certified memory usage analysis
-
In J. Fitzgerald, I. Hayes, and A. Tarlecki, editors To appear
-
D. Cachera, T. Jensen, D. Pichardie, and G. Schneider. Certified memory usage analysis. In J. Fitzgerald, I. Hayes, and A. Tarlecki, editors, Proceedings of FM'05, volume 3582 of Lecture Notes in Computer Science, pages 91-106, 2005. To appear.
-
(2005)
Proceedings of FM'05, Volume 3582 of Lecture Notes in Computer Science
, pp. 91-106
-
-
Cachera, D.1
Jensen, T.2
Pichardie, D.3
Schneider, G.4
-
9
-
-
24644439389
-
Enforcing Resource Bounds via Static Verification of Dynamic Checks
-
In S. Sagiv, editor Springer-Verlag
-
A. Chander, D. Espinosa, N. Islam, P. Lee, and G. Necula. Enforcing Resource Bounds via Static Verification of Dynamic Checks. In S. Sagiv, editor, Proceedings of ESOP'05, volume 3444 of Lecture Notes in Computer Science, pages 311-325. Springer-Verlag, 2005.
-
(2005)
Proceedings of ESOP'05, Volume 3444 of Lecture Notes in Computer Science
, pp. 311-325
-
-
Chander, A.1
Espinosa, D.2
Islam, N.3
Lee, P.4
Necula, G.5
-
10
-
-
84883291969
-
-
Coq Development Team. The Coq Proof Assistant User's Guide. Version 8. 0, January
-
Coq Development Team. The Coq Proof Assistant User's Guide. Version 8. 0, January 2004.
-
(2004)
-
-
-
11
-
-
0033702591
-
Resource bound certification
-
ACMPress
-
K. Crary and S. Weirich. Resource bound certification. In Proceedings of POPL'00, pages 184-198. ACMPress, 2000.
-
(2000)
Proceedings of POPL'00
, pp. 184-198
-
-
Crary, K.1
Weirich, S.2
-
13
-
-
0042383146
-
A type system for the java bytecode language and verifier
-
December
-
S. N. Freund and J. C. Mitchell. A Type System for the Java Bytecode Language and Verifier. Journal of Automated Reasoning, 30(3-4):271-321, December 2003.
-
(2003)
Journal of Automated Reasoning
, vol.30
, Issue.3-4
, pp. 271-321
-
-
Freund, S.N.1
Mitchell, J.C.2
-
14
-
-
11344253336
-
Program instrumentation and run-time analysis of scoped memory in java
-
In K. Havelund and G. Rosu, editors
-
D. Garbervetsky, C. Nakhli, S. Yovine, and H. Zorgati. Program instrumentation and run-time analysis of scoped memory in java. In K. Havelund and G. Rosu, editors, Proceedings of RV'04, volume 113 of Electronic Notes in Theoretical Computer Science. Elsevier, 2004.
-
(2004)
Proceedings of RV'04, Volume 113 of Electronic Notes in Theoretical Computer Science. Elsevier
-
-
Garbervetsky, D.1
Nakhli, C.2
Yovine, S.3
Zorgati, H.4
-
15
-
-
0037967713
-
Static prediction of heap space usage for first-order functional programs
-
ACMPress
-
M. Hofmann and S. Jost. Static prediction of heap space usage for first-order functional programs. In Proceedings of POPL'03, pages 185-197. ACMPress, 2003.
-
(2003)
Proceedings of POPL'03
, pp. 185-197
-
-
Hofmann, M.1
Jost, S.2
-
16
-
-
0037432611
-
Verified bytecode verifiers
-
April
-
G. Klein and T. Nipkow. Verified bytecode verifiers. Theoretical Computer Science, 298(3):583-626, April 2002.
-
(2002)
Theoretical Computer Science
, vol.298
, Issue.3
, pp. 583-626
-
-
Klein, G.1
Nipkow, T.2
-
17
-
-
0346255705
-
-
G. T. Leavens, E. Poll, C. Clifton, Y. Cheon, C. Ruby, D. Cok, and J. Kiniry. JML Reference Manual.
-
JML Reference Manual
-
-
Leavens, G.T.1
Poll, E.2
Clifton, C.3
Cheon, Y.4
Ruby, C.5
Cok, D.6
Kiniry, J.7
-
21
-
-
33745772488
-
Enforcing high-level security properties for applets
-
InP. Paradinas and J.-J. Quisquater, editors
-
M. Pavlova,G. Barthe, L. Burdy,M. Huisman, and J.-L. Lanet. Enforcing high-level security properties for applets. InP. Paradinas and J.-J. Quisquater, editors, Proceedings of CARDIS'04. Kluwer, 2004.
-
(2004)
Proceedings of CARDIS'04. Kluwer
-
-
Pavlova, M.1
Barthe, G.2
Burdy, L.3
Huisman, M.4
Lanet, J.-L.5
-
23
-
-
84883295305
-
Extending sequential specification techniques for modular specification and verification of multi-threaded programs
-
Springer-Verlag, To appear
-
E. Rodr?iguez, M. B. Dwyer, C. Flanagan, J. Hatcliff, G. T. Leavens, and Robby. Extending sequential specification techniques for modular specification and verification of multi-threaded programs. In Proceedings of ECOOP'05, volume 3xxx of Lecture Notes in Computer Science. Springer-Verlag, 2005. To appear.
-
(2005)
Proceedings of ECOOP'05, Volume 3xxx of Lecture Notes in Computer Science
-
-
Rodriguez, E.1
Dwyer, M.B.2
Flanagan, C.3
Hatcliff, J.4
Leavens, G.T.5
Robby6
-
24
-
-
26444457628
-
A constraint-based algorithm for analysing memory usage on java cards
-
Technical Report RR-5440 December
-
G. Schneider. A constraint-based algorithm for analysing memory usage on java cards. Technical Report RR-5440, INRIA, December 2004.
-
(2004)
INRIA
-
-
Schneider, G.1
-
25
-
-
84883280049
-
-
Simplify.
-
Simplify. http://research. compaq. com/SRC/esc/ Simplify. html.
-
-
-
-
26
-
-
0346971008
-
Operational semantics of the Java Card Virtual Machine
-
I. Siveroni. Operational semantics of the Java Card Virtual Machine. J. Logic and Algebraic Programming, 58(1-2), 2004.
-
(2004)
J. Logic and Algebraic Programming
, vol.58
, Issue.1-2
-
-
Siveroni, I.1
-
27
-
-
0003539668
-
-
Springer-Verlag
-
R. Stärk, J. Schmid, and E. Börger. Java and the Java Virtual Machine-Definition, Verification, Validation. Springer-Verlag, 2001.
-
(2001)
Java and the Java Virtual Machine-Definition, Verification, Validation
-
-
Stärk, R.1
Schmid, J.2
Börger, E.3
-
28
-
-
14544304383
-
Foundational typed assembly language for grid computing
-
Technical Report CMU-CS-04-104 February
-
J. C. Vanderwaart and K. Crary. Foundational typed assembly language for grid computing. Technical Report CMU-CS-04-104, CMU, February 2004.
-
(2004)
CMU
-
-
Vanderwaart, J.C.1
Crary, K.2
-
29
-
-
24644483342
-
Asserting bytecode safety
-
In S. Sagiv, editor Springer-Verlag
-
M. Wildmoser and T. Nipkow. Asserting bytecode safety. In S. Sagiv, editor, Proceedings of ESOP'05, volume 3444 of Lecture Notes in Computer Science, pages 326-341. Springer-Verlag, 2005.
-
(2005)
Proceedings of ESOP'05, Volume 3444 of Lecture Notes in Computer Science
, pp. 326-341
-
-
Wildmoser, M.1
Nipkow, T.2
|