COMB: Computing Relevant Program Behaviors
暂无分享,去创建一个
Ahmed Tamrawi | Suresh Kothari | Benjamin Holland | Payas Awadhutkar | Jon Mathews | Ahmed Tamrawi | S. Kothari | Payas Awadhutkar | Benjamin Holland | Jon Mathews
[1] Yu Chen,et al. A New Algorithm for Identifying Loops in Decompilation , 2007, SAS.
[2] Ahmed Tamrawi,et al. Projected Control Graph for Accurate and Efficient Analysis of Safety and Security Vulnerabilities , 2016, 2016 23rd Asia-Pacific Software Engineering Conference (APSEC).
[3] Thomas A. Henzinger,et al. The software model checker Blast , 2007, International Journal on Software Tools for Technology Transfer.
[4] Thomas A. Henzinger,et al. The software model checker B last : Applications to software engineering , 2007 .
[5] Robert E. Tarjan,et al. Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..
[6] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[7] Sowmyanarayanan Sadagopan,et al. WWW: service provider , 2002, UBIQ.
[8] Dirk Beyer,et al. Correctness witnesses: exchanging verification results between verifiers , 2016, SIGSOFT FSE.
[9] Richard J. Lipton,et al. Social processes and proofs of theorems and programs , 1977, POPL.
[10] Ahmed Tamrawi,et al. Modeling lessons from verifying large software systems for safety and security , 2017, 2017 Winter Simulation Conference (WSC).
[11] Suresh Kothari,et al. Atlas: a new way to explore software, build analysis tools , 2014, ICSE Companion.