Software analysis methods for resource-sensitive systems
暂无分享,去创建一个
[1] Sander van der Burg,et al. A Reference Architecture for Distributed Software Deployment , 2013 .
[2] Suzette Person,et al. Regression Verification Using Impact Summaries , 2013, SPIN.
[3] Benjamin C. Pierce,et al. Types and programming languages: the next generation , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[4] Jan Reineke,et al. Timing predictability of cache replacement policies , 2007, Real-Time Systems.
[5] Alex Groce,et al. Establishing flight software reliability: testing, model checking, constraint-solving, monitoring and learning , 2014, Annals of Mathematics and Artificial Intelligence.
[6] Gavin Lowe,et al. Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[7] Minh Tri Ngo,et al. Qualitative and Quantitative Information Flow Analysis for Multi-threaded Programs , 2014 .
[8] G. Reeves,et al. The Mars Rover Spirit FLASH anomaly , 2005, 2005 IEEE Aerospace Conference.
[9] Eric Jenn,et al. Use of PERC Pico in the AIDA avionics platform , 2009, JTRES '09.
[10] J Hayhurst Kelly,et al. A Practical Tutorial on Modified Condition/Decision Coverage , 2001 .
[11] Gerhard de Koning Gans,et al. Outsmarting smart cards , 2013 .
[12] Marko C. J. D. van Eekelen,et al. Interpolation-Based Height Analysis for Improving a Recurrence Solver , 2011, FOPARA.
[13] Bart Jacobs,et al. Java Program Verification via a Hoare Logic with Abrupt Termination , 2000, FASE.
[14] Klaus Havelund,et al. Model checking JAVA programs using JAVA PathFinder , 2000, International Journal on Software Tools for Technology Transfer.
[15] Corina S. Pasareanu,et al. Symbolic PathFinder: symbolic execution of Java bytecode , 2010, ASE.
[16] D. Bosnacki. Enhancing state space reduction techniques for model checking , 2001 .
[17] Elisa Costante,et al. Privacy throughout the data cycle , 2015 .
[18] Edmund M. Clarke,et al. Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic , 2008, 25 Years of Model Checking.
[19] Fides Aarts,et al. Tomte : bridging the gap between active learning and real-world systems , 2014 .
[20] van der,et al. Domain specific languages and their type systems , 2014 .
[21] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[22] Elvira Albert,et al. COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode , 2008, FMCO.
[23] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[24] Patrice Godefroid,et al. Automatic partial loop summarization in dynamic test generation , 2011, ISSTA '11.
[25] Karina R. Olmos Joffré. Strategies for Context Sensitive Program Transformation , 2009 .
[26] Sarfraz Khurshid,et al. Symbolic execution for software testing in practice: preliminary assessment , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[27] T. V. Bui,et al. A software architecture for body area sensor networks : flexibility and trustworthiness , 2015 .
[28] Jan Gustafsson,et al. Loop Bound Analysis based on a Combination of Program Slicing, Abstract Interpretation, and Invariant Analysis , 2007, WCET.
[29] Tim K. Cocx,et al. Algorithmic tools for data-oriented law enforcement , 2009 .
[30] Frank S. de Boer,et al. Combining Monitoring with Run-Time Assertion Checking , 2014, SFM.
[31] Trajce Dimkov,et al. Alignment of organizational security policies: Theory and Practice , 2012 .
[32] Marko C. J. D. van Eekelen,et al. Collected Size Semantics for Functional Programs over Lists , 2008, IFL.
[33] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[34] Daniel Cordes,et al. A Fast and Precise Static Loop Analysis Based on Abstract Interpretation, Program Slicing and Polytope Models , 2009, 2009 International Symposium on Code Generation and Optimization.
[35] Marko C. J. D. van Eekelen,et al. A Formal Verification Study on the Rotterdam Storm Surge Barrier , 2010, ICFEM.
[36] Feng Zhao,et al. Fine-grained energy profiling for power-aware application design , 2008, PERV.
[37] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[38] Eduardo Zambon,et al. Abstract Graph Transformation - Theory and Practice , 2013 .
[39] Panagiotis Manolios,et al. Computer-Aided Reasoning: An Approach , 2011 .
[40] M Muhammad Atif,et al. Formal modeling and verification of distributed failure detectors , 2011 .
[41] Bart Jacobs,et al. AHA: Amortized Heap Space Usage Analysis , 2007, Trends in Functional Programming.
[42] R.S.S. O'Connor,et al. Incompleteness & completeness : formalizing logic and analysis in type theory , 2005 .
[43] Stefan Dietzel,et al. Resilient in-network aggregation for vehicular networks , 2015 .
[44] Arend Rensink,et al. Graph Transforming Java Data , 2012, FASE.
[45] Georgeta Igna,et al. Performance analysis of real-time task systems using timed automata , 2013 .
[46] Gerard J. Holzmann,et al. Model-Driven Software Verification , 2004, SPIN.
[47] Christopher W. Brown. QEPCAD B: a program for computing with semi-algebraic sets using CADs , 2003, SIGS.
[48] van den,et al. Composition and synchronization of real-time components upon one processor , 2013 .
[49] Martin Hofmann,et al. Multivariate amortized resource analysis , 2012, TOPL.
[50] Marcel Verhoef,et al. Modeling and validating distributed embedded real-time control systems , 2009 .
[51] van Pja Paul Tilburg. From computability to executability : a process-theoretic view on automata theory , 2011 .
[52] Wang Yi,et al. UPPAAL - a Tool Suite for Automatic Verification of Real-Time Systems , 1996, Hybrid Systems.
[53] Alexander Aiken,et al. A Data Driven Approach for Algebraic Loop Invariants , 2013, ESOP.
[54] Pim Vullers,et al. Efficient implementations of attribute-based credentials on smart cards , 2014 .
[55] Christel Baier,et al. Principles of model checking , 2008 .
[56] Yanja Dajsuren,et al. On the design of an architecture framework and quality evaluation for automotive software systems , 2015 .
[57] Marko C. J. D. van Eekelen,et al. Polynomial Size Analysis of First-Order Functions , 2007, TLCA.
[58] Stephen McCamant,et al. Loop-extended symbolic execution on binary programs , 2009, ISSTA.
[59] Saeed Sedghi,et al. Towards Provably Secure Efficiently Searchable Encryption , 2012 .
[60] Hendrik Michaël van der Bijl,et al. On changing models in model-based testing , 2011 .
[61] Robert W. Floyd,et al. Assigning Meanings to Programs , 1993 .
[62] Lauretta O. Osho,et al. Axiomatic Basis for Computer Programming , 2013 .
[63] Yanjing Wang,et al. Epistemic Modelling and Protocol Dynamics , 2010 .
[64] N Neda Noroozi,et al. Improving input-output conformance testing theories , 2014 .
[65] Paulo Romero Martins Maciel,et al. Analyzing Software Performance and Energy Consumption of Embedded Systems by Probabilistic Modeling: An Approach Based on Coloured Petri Nets , 2006, ICATPN.
[66] Christoph Gladisch,et al. Verification-Based Test Case Generation for Full Feasible Branch Coverage , 2008, 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods.
[67] de A. Bruin,et al. Service-oriented discovery of knowledge : foundations, implementations and applications , 2010 .
[68] Young-Joo Moon,et al. Stochastic models for quality of service of component connectors , 2011 .
[69] Matthew B. Dwyer,et al. Differential symbolic execution , 2008, SIGSOFT '08/FSE-16.
[70] Mjm Marcel Roeloffzen. Kinetic data structures in the black-box model , 2013 .
[71] Martin Hofmann,et al. Amortized Resource Analysis with Polynomial Potential , 2010, ESOP.
[72] Damiano Bolzoni,et al. Revisiting Anomaly-based Network Intrusion Detection Systems , 2009 .
[73] Marko C. J. D. van Eekelen,et al. Making resource analysis practical for real-time Java , 2012, JTRES '12.
[74] Nikolai Tillmann,et al. Characteristic studies of loop problems for structural test generation via symbolic execution , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[75] Eric Saxe,et al. Power-efficient software , 2010, Commun. ACM.
[76] Bas Basten,et al. Ambiguity Detection for Programming Language Grammars , 2011 .
[77] Axel Belinfante,et al. JTorX: exploring model-based testing , 2014 .
[78] Martin R. Neuhäußer,et al. Model checking nondeterministic and randomly timed systems , 2010 .
[79] M. S. Greiler,et al. Test Suite Comprehension for Modular and Dynamic Systems , 2013 .
[80] Monica S. Lam,et al. Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking , 2008, USENIX Security Symposium.
[81] Alessandro Armando,et al. LTL Model Checking for Security Protocols , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[82] Kang G. Shin,et al. Profiling Software for Energy Consumption , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[83] Carst Tankink. Documentation and formal mathematics : web technology meets theorem proving , 2013 .
[84] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[85] Wouter Meulemans,et al. Similarity measures and algorithms for cartographic schematization , 2014 .
[86] C. J. Boogerd,et al. Focusing Automatic Code Inspections , 2010 .
[87] J. Kwisthout,et al. The Computational Complexity of Probabilistic Networks , 2009 .
[88] Arthur I. Baars,et al. Embedded Compilers , 2009 .
[89] Stephanie Kemper,et al. Modelling and analysis of real-time coordination patterns , 2011 .
[90] Adriaan Middelkoop,et al. Inference of Program Properties with Attribute Grammars, Revisited , 2012 .
[91] Shengchao Qin,et al. Stack Bound Inference for Abstract Java Bytecode , 2010, 2010 4th IEEE International Symposium on Theoretical Aspects of Software Engineering.
[92] K. Wiegmink,et al. Using CHARTER tools to develop a safety-critical avionics application in Java , 2012, JTRES '12.
[93] Rjm Rolf Theunissen. Supervisory control in health care systems , 2015 .
[94] Gergely Alpár,et al. Attribute-based identity management : [bridging the cryptographic design of ABCs with the real world] , 2015 .
[95] Peter W. O'Hearn,et al. Local Reasoning about Programs that Alter Data Structures , 2001, CSL.
[96] Manuel V. Hermenegildo,et al. Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models , 2013, LOPSTR.
[97] K. Tsirogiannis,et al. Analysis of flow and visibility on triangulated terrains , 2011 .
[98] Lennart C. L. Kats,et al. Building Blocks for Language Workbenches , 2011 .
[99] Roel Verdult,et al. The (in)security of proprietary cryptography , 2015 .
[100] M. J. de Mol,et al. Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .
[101] van Mj Muck Weerdenburg,et al. Efficient rewriting techniques , 2009 .
[102] James J. Hunt,et al. Using global data flow analysis on bytecode to aid worst case execution time analysis for real-time Java programs , 2008, JTRES '08.
[103] Sebastiaan Gijsbert Marinus Cornelissen,et al. Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .
[104] L. Lensink,et al. Applying formal methods in software development , 2013 .
[105] D. E. Nadales Agut,et al. A Compositional Interchange Format for Hybrid Systems: Design and Implementation , 2012 .
[106] Lori A. Clarke,et al. A program testing system , 1976, ACM '76.
[107] Frank Stajano,et al. The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.
[108] Marko C. J. D. van Eekelen,et al. Polynomial Size Analysis of First-Order Shapely Functions , 2009, Log. Methods Comput. Sci..
[109] Steven te Brinke. Developing Energy-Aware Software , 2011 .
[110] Sumit Gulwani,et al. SPEED: Symbolic Complexity Bound Analysis , 2009, CAV.
[111] Dan Grossman,et al. EnerJ: approximate data types for safe and general low-power computation , 2011, PLDI '11.
[112] Mark Timmer,et al. Efficient modelling, generation and analysis of Markov automata , 2013 .
[113] Corina S. Pasareanu,et al. Verification of Java Programs Using Symbolic Execution and Invariant Generation , 2004, SPIN.
[114] Cor-Paul Bezemer,et al. Performance Optimization of Multi-Tenant Software Systems , 2014 .
[115] John C. Reynolds,et al. Separation logic: a logic for shared mutable data structures , 2002, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science.
[116] Karl N. Levitt,et al. SELECT—a formal system for testing and debugging programs by symbolic execution , 1975 .
[117] Ronald Middelkoop,et al. Capturing and exploiting abstract views of states in OO verification , 2011 .
[118] Dina Hadžiosmanović,et al. The process matters: cyber security in industrial control systems , 2014 .
[119] Stjepan Picek,et al. Applications of evolutionary computation to cryptology , 2015 .
[120] Lionel Mamane,et al. Interactive mathematical documents: creation and presentation , 2004 .
[121] B. Lijnse,et al. TOP to the rescue. Task-oriented programming for incident response applications , 2005 .
[122] Mari Antonius Cornelis Dekker,et al. Flexible Access Control for Dynamic Collaborative Environments , 2009 .
[123] Mohammad Mahdi Jaghoori,et al. Time At Your Service: Schedulability Analysis of Real-Time and Distributed Services , 2010 .
[124] Jakob Engblom,et al. The worst-case execution-time problem—overview of methods and survey of tools , 2008, TECS.
[125] Dina Katabi,et al. Secure In-Band Wireless Pairing , 2011, USENIX Security Symposium.
[126] Olha Shkaravska,et al. Inferring static non-monotonically sized types through testing , 2007 .
[127] Rody Kersten,et al. Test-based inference of polynomial loop-bound functions , 2010, PPPJ.
[128] Aah Ammar Osaiweran. Formal development of control software in the medical systems domain , 2012 .
[129] René Mayrhofer,et al. On the Security of Ultrasound as Out-of-band Channel , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[130] Scw Bas Ploeger,et al. Improved verification methods for concurrent systems , 2009 .
[131] Olha Shkaravska,et al. Size Analysis of Algebraic Data Types , 2008, TFP 2008 2008.
[132] Marko C. J. D. van Eekelen,et al. Higher-Order Size Checking without Subtyping , 2012, Trends in Functional Programming.
[133] Suzette Person,et al. A change impact analysis to characterize evolving program behaviors , 2012, 2012 28th IEEE International Conference on Software Maintenance (ICSM).
[134] RungtaNeha,et al. Improving Coverage of Test Cases Generated by Symbolic PathFinder for Programs with Loops , 2015 .
[135] Hasan Sözer,et al. Architecting Fault-Tolerant Software Systems , 2009 .
[136] Erik D. Demaine,et al. Energy-Efficient Algorithms , 2016, ITCS.
[137] Margaret Martonosi,et al. Wattch: a framework for architectural-level power analysis and optimizations , 2000, Proceedings of 27th International Symposium on Computer Architecture (IEEE Cat. No.RS00201).
[138] Parthasarathy Ranganathan. Recipe for efficiency: principles of power-aware computing , 2010, CACM.
[139] Jja Jeroen Keiren,et al. Advanced reduction techniques for model checking , 2013 .
[140] C. V. Ramamoorthy,et al. On the Automated Generation of Program Test Data , 1976, IEEE Transactions on Software Engineering.
[141] Fabio Martinelli,et al. Partial model checking and theorem proving for ensuring security properties , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[142] Anja Guzzi,et al. Supporting Developers' Teamwork from within the IDE , 2015 .
[143] Pascal Sainrat,et al. Static Loop Bound Analysis of C Programs Based on Flow Analysis and Abstract Interpretation , 2008, 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.
[144] Werner Heijstek,et al. Architecture design in global and model-centric software development , 2012 .
[145] Joost Winter,et al. Coalgebraic Characterizations of Automata-Theoretic Classes , 2014 .
[146] Koushik Sen,et al. Symbolic execution for software testing: three decades later , 2013, CACM.
[147] J. van den Berg,et al. Reasoning about Java programs in PVS using JML , 2009 .
[148] Pierre Castéran,et al. Interactive Theorem Proving and Program Development , 2004, Texts in Theoretical Computer Science An EATCS Series.
[149] John Businge,et al. Co-evolution of the Eclipse SDK Framework and Its Third-Party Plug-Ins , 2013, 2013 17th European Conference on Software Maintenance and Reengineering.
[150] Natarajan Shankar,et al. PVS: A Prototype Verification System , 1992, CADE.
[151] René Mayrhofer,et al. A Human-Verifiable Authentication Protocol Using Visible Laser Light , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[152] Peter H. Schmitt,et al. Provably correct loops bounds for realtime Java programs , 2006, JTRES '06.
[153] Suzette Person,et al. Computing and visualizing the impact of change with Java PathFinder extensions , 2012, SOEN.
[154] Gustavo Rau de Almeida Callou,et al. A Formal Model for Performance and Energy Evaluation of Embedded Systems , 2011, EURASIP J. Embed. Syst..
[155] A. Rodriguez Yakushev,et al. Towards Getting Generic Programming Ready for Prime Time , 2009 .
[156] Steven te Brinke,et al. A tool-supported approach for modular design of energy-aware software , 2014, SAC.
[157] Steven te Brinke,et al. A design method for modular energy-aware software , 2013, SAC '13.
[158] R. Bakhshi. Gossiping Models : Formal Analysis of Epidemic Protocols , 2011 .
[159] Cuiting Chen,et al. Automated Fault Localization for Service-Oriented Software Systems , 2015 .
[160] Tim K. Cocx,et al. Metrics and visualisation for crime analysis and genomics , 2005 .
[161] Jeroen Bransen,et al. On the Incremental Evaluation of Higher-Order Attribute Grammars , 2015 .
[162] Adrian Perrig,et al. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup , 2007, Financial Cryptography.
[163] René Mayrhofer,et al. Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction , 2007, UbiComp.
[164] Alfons Laarman,et al. Scalable multi-core model checking , 2014 .
[165] Roberto M. Amadio. Synthesis of max-plus quasi-interpretations , 2005, Fundam. Informaticae.
[166] Hugo Jonker,et al. Security matters : privacy in voting and fairness in digital exchange , 2009 .
[167] Elvira Albert,et al. More Precise Yet Widely Applicable Cost Analysis , 2011, VMCAI.
[168] Oscar H. Ibarra,et al. On spiking neural P systems , 2006, Natural Computing.
[169] Thomas Bäck,et al. Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .
[170] D. Costa. Formal models for component connectors , 2010 .
[171] H. Hansen. Coalgebraic Modelling : Applications in Automata theory and Modal logic , 2009 .
[172] N. Asokan,et al. Secure device pairing based on a visual channel , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[173] Stephan Merz,et al. Model Checking , 2000 .
[174] Rody Kersten,et al. Soundness proof for a hoare logic for energy consumption analysis , 2013 .
[175] Z Zvezdan Protic,et al. Configuration management for models : generic methods for model comparison and model co-evolution , 2011 .
[176] van Mpwj Michiel Osch. Model-based testing of hybrid systems , 2007 .
[177] Tiago Espinha,et al. Web Service Growing Pains: Understanding Services and Their Clients , 2015 .
[178] Robert Atkey,et al. Amortised Resource Analysis with Separation Logic , 2010, ESOP.
[179] S Sjoerd Cranen,et al. Getting the point : obtaining and understanding fixpoints in model checking , 2015 .
[180] N. Asokan,et al. Security Associations in Personal Networks: A Comparative Analysis , 2007, ESAS.
[181] Miguel E. Andrés,et al. Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems , 2011, ArXiv.
[182] Zef Hemel. Methods and Techniques for the Design and Implementation of Domain-Specific Languages , 2012 .
[183] Elvira Albert,et al. Automatic Inference of Upper Bounds for Recurrence Relations in Cost Analysis , 2008, SAS.
[184] Tom Staijen,et al. Graph-based Specification and Verification for Aspect-Oriented Languages , 2010 .
[185] Anna I. Esparcia-Alc. Applications of Evolutionary Computation , 2016, Lecture Notes in Computer Science.
[186] Ricardo Peña-Marí,et al. Certified Absence of Dangling Pointers in a Language with Explicit Deallocation , 2010, IFM.
[187] Adrianus Johannus Paulus Jeckmans. Cryptographically-Enhanced Privacy for Recommender Systems , 2014 .
[188] Hossein Rahmani,et al. Analysis of protein-protein interaction networks by means of annotated graph mining algorithms , 2012 .
[189] Dhp Dirk Gerrits. Pushing and pulling : computing push plans for disk-shaped robots, and dynamic labelings for moving points , 2013 .
[190] Jan Vitek,et al. CDx: a family of real-time Java benchmarks , 2009, JTRES '09.
[191] Gerard J. Holzmann,et al. The Model Checker SPIN , 1997, IEEE Trans. Software Eng..
[192] J. van den Bos,et al. Gathering evidence: Model-driven software engineering in automated digital forensics , 2014 .
[193] B. J. Arnoldus,et al. An illumination of the template enigma : software code generation with templates , 2011 .
[194] Clark W. Barrett,et al. The SMT-LIB Standard Version 2.0 , 2010 .
[195] Joe F. Chicharo,et al. Unfairness and capture behaviour in 802.11 adhoc networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.
[196] Joseph Sifakis,et al. Specification and verification of concurrent systems in CESAR , 1982, Symposium on Programming.
[197] Gary T. Leavens,et al. Beyond Assertions: Advanced Specification and Verification with JML and ESC/Java2 , 2005, FMCO.
[198] Sebastian Götz,et al. JouleUnit: a generic framework for software energy profiling and testing , 2013 .
[199] Sumit Gulwani,et al. Control-flow refinement and progress invariants for bound analysis , 2009, PLDI '09.
[200] Marko C. J. D. van Eekelen,et al. Using Model-Checking to Reveal a Vulnerability of Tamper-Evident Pairing , 2013, NASA Formal Methods.
[201] Ali Mesbah,et al. Analysis and Testing of Ajax-based Single-page Web Applications , 2009 .
[202] Sumit Gulwani,et al. The reachability-bound problem , 2010, PLDI '10.
[203] Martin Hofmann,et al. Static prediction of heap space usage for first-order functional programs , 2003, POPL '03.
[204] Anantha Chandrakasan,et al. JouleTrack: a web based tool for software energy profiling , 2001, DAC '01.
[205] Kab Kevin Verbeek. Algorithms for cartographic visualization , 2012 .
[206] Christian Krause,et al. Reconfigurable Component Connectors , 2011 .
[207] Lawrence Charles Paulson,et al. Isabelle: A Generic Theorem Prover , 1994 .
[208] A. J. van der Ploeg,et al. Efficient abstractions for visualization and interaction , 2015 .
[209] Fpm Frank Stappers. Bridging formal models : an engineering perspective , 2012 .
[210] van Mf Marcel Amstel,et al. Assessing and improving the quality of model transformations , 2012 .
[211] Arie van Deursen,et al. A Systematic Survey of Program Comprehension through Dynamic Analysis , 2008, IEEE Transactions on Software Engineering.
[212] Marcin Czenko,et al. TuLiP : reshaping trust management , 2009 .
[213] Somayeh Malakuti Khah Olun Abadi. Event composition model: achieving naturalness in runtime enforcement , 2011 .
[214] Farhad Arbab,et al. Model Checking of Component Connectors , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[215] Amir M. Ben-Amram. Size-Change Termination, Monotonicity Constraints and Ranking Functions , 2009, CAV.
[216] Jedrzej Fulara,et al. Practically Applicable Formal Methods , 2009, SOFSEM.
[217] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[218] Yang Wang,et al. Serial hook-ups: a comparative usability study of secure device pairing methods , 2009, SOUPS.
[219] Nancy G. Leveson,et al. An empirical evaluation of the MC/DC coverage criterion on the HETE-2 satellite software , 2000, 19th DASC. 19th Digital Avionics Systems Conference. Proceedings (Cat. No.00CH37126).
[220] Jan Reineke,et al. CAMA: A Predictable Cache-Aware Memory Allocator , 2011, 2011 23rd Euromicro Conference on Real-Time Systems.
[221] Andreas Podelski,et al. A Complete Method for the Synthesis of Linear Ranking Functions , 2004, VMCAI.
[222] Xianfeng Li,et al. Estimating the Worst-Case Energy Consumption of Embedded Software , 2006, 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'06).
[223] Ben Wegbreit,et al. Mechanical program analysis , 1975, CACM.
[224] Tingting Han,et al. Diagnosis, Synthesis and Analysis of Probabilistic Models , 2009, Ausgezeichnete Informatikdissertationen.
[225] Marko C. J. D. van Eekelen,et al. ECAlogic: hardware-parametric energy-consumption analysis of algorithms , 2014, FOAL.
[226] Elvira Albert,et al. Parametric inference of memory requirements for garbage collected languages , 2010, ISMM '10.
[227] Seyyed Hamed Hashemi,et al. Studies on verification of wireless sensor networks and abstraction learning for system inference , 2008 .
[228] A. W. Roscoe,et al. Usability and security of out-of-band channels in secure device pairing protocols , 2009, SOUPS.
[229] L. D. Moura,et al. The YICES SMT Solver , 2006 .
[230] Joeri de Ruiter,et al. Lessons learned in the analysis of the EMV and TLS security protocols , 2015 .
[231] J. K. Berendsen,et al. Abstraction, prices and probability in model checking timed automata , 2010 .
[232] M. D. Berg,et al. Optimal Geometric Data Structures , 2007 .
[233] Michiel Helvensteijn,et al. Abstract delta modeling : software product lines and beyond , 2014 .
[234] Marek Trtík. Symbolic Execution and Program Loops , 2013 .
[235] Wei Tu,et al. Model checking an entire Linux distribution for security violations , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[236] Shiao-Li Tsao,et al. SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions , 2012, J. Syst. Softw..
[237] A. Morali,et al. IT architecture-based confidentiality risk assessment in networks of organizations , 2011 .
[238] Mohammed G. Khatib. MEMS-Based Storage Devices : Integration in Energy-Constrained Mobile Systems , 2009 .
[239] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[240] Lacramioara Astefanoaei,et al. An executable theory of multi-agent systems refinement , 2011 .