The SCEAS System
Navigation Menu

Conferences in DBLP

Static Analysis (WSA/SAS) (sas)
2001 (conf/sas/2001)

  1. Martin C. Rinard
    Analysis of Multithreaded Programs. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:1-19 [Conf]
  2. Miquel Bertran, Francesc-Xavier Babot, August Climent, Miquel Nicolau
    Communication and Parallelism Introduction and Elimination in Imperative Concurrent Programs. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:20-39 [Conf]
  3. Raghavan Komondoor, Susan Horwitz
    Using Slicing to Identify Duplication in Source Code. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:40-56 [Conf]
  4. Richard Sharp, Alan Mycroft
    Soft Scheduling for Hardware. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:57-72 [Conf]
  5. Kevin Glynn, Peter J. Stuckey, Martin Sulzmann
    Effective Strictness Analysis with HORN Constraints. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:73-92 [Conf]
  6. Frédéric Mesnard, Ulrich Neumerkel
    Applying Static Analysis Techniques for Inferring Termination Conditions of Logic Programs. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:93-110 [Conf]
  7. David Monniaux
    An Abstract Analysis of the Probabilistic Termination of Programs. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:111-126 [Conf]
  8. Fausto Spoto
    Watchpoint Semantics: A Tool for Compositional and Focussed Static Analyses. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:127-145 [Conf]
  9. Lunjin Lu
    Parameterizing a Groundness Analysis of Logic Programs. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:146-164 [Conf]
  10. Roberto Bagnara, Roberta Gori, Patricia M. Hill, Enea Zaffanella
    Finite-Tree Analysis for Constraint Logic-Based Languages. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:165-184 [Conf]
  11. K. Rustan M. Leino
    Applications of Extended Static Checking. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:185-193 [Conf]
  12. Nurit Dor, Michael Rodeh, Shmuel Sagiv
    Cleanness Checking of String Manipulations in C Programs via Integer Analysis. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:194-212 [Conf]
  13. Yanhong A. Liu, Ning Li, Scott D. Stoller
    Solving Regular Tree Grammar Based Constraints. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:213-233 [Conf]
  14. Eric Goubault
    Static Analyses of the Precision of Floating-Point Operations. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:234-259 [Conf]
  15. Manuvir Das, Ben Liblit, Manuel Fähndrich, Jakob Rehof
    Estimating the Impact of Scalable Pointer Analysis on Optimization. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:260-278 [Conf]
  16. Donglin Liang, Mary Jean Harrold
    Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:279-298 [Conf]
  17. Farn Wang, Hsu-Chun Yen
    Parametric Optimization of Open Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:299-318 [Conf]
  18. Natalia Sidorova, Martin Steffen
    Embedding Chaos. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:319-334 [Conf]
  19. Ahmed Bouajjani, Aurore Collomb-Annichini, Yassine Lakhnech, Mihaela Sighireanu
    Analyzing Fair Parametric Extended Automata. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:335-355 [Conf]
  20. Roberto Giacobazzi, Elisa Quintarelli
    Incompleteness, Counterexamples, and Refinements in Abstract Model-Checking. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:356-373 [Conf]
  21. Fred B. Schneider
    Language-Based Security: What's Needed and Why. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:374- [Conf]
  22. Sriram K. Rajamani, Jakob Rehof
    A Behavioral Module System for the Pi-Calculus. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:375-394 [Conf]
  23. Francesca Levi, Sergio Maffeis
    An Abstract Interpretation Framework for Analysing Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:395-411 [Conf]
  24. Jérôme Feret
    Abstract Interpretation-Based Static Analysis of Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:412-430 [Conf]
  25. David Wagner
    Static Analysis and Software Assurance. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:431- [Conf]
  26. Andrew D. Gordon, Alan Jeffrey
    A Type and Effect Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:432-432 [Conf]
  27. Bruno Blanchet
    Abstracting Cryptographic Protocols by Prolog Rules. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:433-436 [Conf]
  28. Andrew C. Myers
    Security-Typed Languages and Distributed Computation. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:437-438 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002