|
Conferences in DBLP
- Samson Abramsky
Algorithmic Game Semantics and Static Analysis. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:1- [Conf]
- Andrew D. Gordon
From Typed Process Calculi to Source-Based Security. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:2- [Conf]
- Roberto Bagnara, Patricia M. Hill, Elena Mazzi, Enea Zaffanella
Widening Operators for Weakly-Relational Numeric Abstractions. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:3-18 [Conf]
- Roberto Bagnara, Enric Rodríguez-Carbonell, Enea Zaffanella
Generation of Basic Semi-algebraic Invariants Using Convex Polyhedra. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:19-34 [Conf]
- Maurice Bruynooghe, John P. Gallagher, Wouter Van Humbeeck
Inference of Well-Typings for Logic Programs with Application to Termination Analysis. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:35-51 [Conf]
- Guilin Chen, Mahmut T. Kandemir, Mustafa Karaköy
Memory Space Conscious Loop Iteration Duplication for Reliable Execution. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:52-69 [Conf]
- Wei-Ngan Chin, Huu Hai Nguyen, Shengchao Qin, Martin C. Rinard
Memory Usage Verification for OO Programs. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:70-86 [Conf]
- Byron Cook, Andreas Podelski, Andrey Rybalchenko
Abstraction Refinement for Termination. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:87-101 [Conf]
- Aleksandar Dimovski, Dan R. Ghica, Ranko Lazic
Data-Abstraction Refinement: A Game Semantic Approach. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:102-117 [Conf]
- Javier Esparza, Pierre Ganty, Stefan Schwoon
Locality-Based Abstractions. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:118-134 [Conf]
- Neal Glew, Jens Palsberg, Christian Grothoff
Type-Safe Optimisation of Plugin Architectures. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:135-154 [Conf]
- Matthew Harren, George C. Necula
Using Dependent Types to Certify the Safety of Assembly Code. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:155-170 [Conf]
- Sebastian Hunt, Isabella Mastroeni
The PER Model of Abstract Non-interference. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:171-185 [Conf]
- Bertrand Jeannet, Denis Gopan, Thomas W. Reps
A Relational Abstraction for Functions. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:186-202 [Conf]
- Yungbum Jung, Jaehwang Kim, Jaeho Shin, Kwangkeun Yi
Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:203-217 [Conf]
- John Kodumal, Alexander Aiken
Banshee: A Scalable Constraint-Based Analysis Toolkit. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:218-234 [Conf]
- Markus Müller-Olm, Helmut Seidl
A Generic Framework for Interprocedural Analysis of Numerical Properties. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:235-250 [Conf]
- Iman Narasamdya, Andrei Voronkov
Finding Basic Block and Variable Correspondence. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:251-267 [Conf]
- Andreas Podelski, Thomas Wies
Boolean Heaps. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:268-283 [Conf]
- Noam Rinetzky, Mooly Sagiv, Eran Yahav
Interprocedural Shape Analysis for Cutpoint-Free Programs. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:284-302 [Conf]
- Xavier Rival
Understanding the Origin of Alarms in Astrée. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:303-319 [Conf]
- Stefano Secci, Fausto Spoto
Pair-Sharing Analysis of Object-Oriented Programs. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:320-335 [Conf]
- Axel Simon, Andy King
Exploiting Sparsity in Polyhedral Analysis. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:336-351 [Conf]
- Tachio Terauchi, Alexander Aiken
Secure Information Flow as a Safety Problem. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:352-367 [Conf]
|