Regularly annotated set constraints
暂无分享,去创建一个
[1] Alexander Aiken,et al. Banshee: A Scalable Constraint-Based Analysis Toolkit , 2005, SAS.
[2] Alexander Aiken,et al. Partial online cycle elimination in inclusion constraint graphs , 1998, PLDI.
[3] Olivier Tardieu,et al. Ultra-fast aliasing analysis using CLA: a million lines of C code in a second , 2001, PLDI '01.
[4] Alexander Aiken,et al. The set constraint/CFL reachability connection in practice , 2004, PLDI '04.
[5] Alexander Aiken,et al. Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C , 2000, SAS.
[6] Thomas W. Reps,et al. Demand interprocedural dataflow analysis , 1995, SIGSOFT FSE.
[7] Daniel Le Métayer,et al. Verification of control flow based security properties , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[9] Alexander Aiken,et al. A Toolkit for Constructing Type- and Constraint-Based Program Analyses , 1998, Types in Compilation.
[10] Jakob Rehof,et al. Type-base flow analysis: from polymorphic subtyping to CFL-reachability , 2001, POPL '01.
[11] Yanhong A. Liu,et al. Parametric regular path queries , 2004, PLDI '04.
[12] David A. Wagner,et al. Model Checking One Million Lines of C Code , 2004, NDSS.
[13] Jakob Rehof,et al. From Polymorphic Subtyping to CFL Reachability: Context-Sensitive Flow Analysis Using Instantiation Constraints , 2000 .
[14] Nevin Charles Heintze,et al. Set based program analysis , 1992 .
[15] Barbara G. Ryder,et al. Annotated inclusion constraints for precise flow analysis , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).
[16] Somesh Jha,et al. Weighted pushdown systems and their application to interprocedural dataflow analysis , 2003, Sci. Comput. Program..
[17] Thomas W. Reps,et al. Precise interprocedural dataflow analysis via graph reachability , 1995, POPL '95.
[18] Barbara G. Ryder,et al. Points-to analysis for Java using annotated constraints , 2001, OOPSLA '01.
[19] Jens Palsberg. Efficient Inference of Object Types , 1995, Inf. Comput..
[20] Manu Sridharan,et al. Demand-driven points-to analysis for Java , 2005, OOPSLA '05.
[21] Alexander Aiken,et al. Program Analysis Using Mixed Term and Set Constraints , 1997, SAS.
[22] Thomas W. Reps,et al. Undecidability of context-sensitive data-dependence analysis , 2000, TOPL.
[23] Monica S. Lam,et al. Cloning-based context-sensitive pointer alias analysis using binary decision diagrams , 2004, PLDI '04.
[24] Alexander Aiken,et al. Projection merging: reducing redundancies in inclusion constraint graphs , 2000, POPL '00.
[25] Alexander Aiken,et al. The Complexity of Set Constraints , 1993, CSL.
[26] Rajeev Alur,et al. Visibly pushdown languages , 2004, STOC '04.
[27] Ondrej Lhoták,et al. Jedd: a BDD-based relational extension of Java , 2004, PLDI '04.