FEEDBACK Smiley face
Normal view MARC view ISBD view

Static Analysis [electronic resource] :13th International Symposium, SAS 2006, Seoul, Korea, August 29-31, 2006. Proceedings /

Contributor(s): Yi, Kwangkeun [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 4134Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.Description: XIII, 443 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540377580.Subject(s): Computer science | Software engineering | Computer programming | Programming languages (Electronic computers) | Computer logic | Mathematical logic | Computer Science | Software Engineering/Programming and Operating Systems | Programming Languages, Compilers, Interpreters | Logics and Meanings of Programs | Software Engineering | Mathematical Logic and Formal Languages | Programming TechniquesOnline resources: Click here to access online
Contents:
Invited Talk -- Unleashing the Power of Static Analysis -- Session 1 -- Static Analysis in Disjunctive Numerical Domains -- Static Analysis of Numerical Algorithms -- Static Analysis of String Manipulations in Critical Embedded C Programs -- Session 2 -- Abstract Regular Tree Model Checking of Complex Dynamic Data Structures -- Structural Invariants -- Existential Label Flow Inference Via CFL Reachability -- Session 3 -- Abstract Interpretation with Specialized Definitions -- Underapproximating Predicate Transformers -- Combining Widening and Acceleration in Linear Relation Analysis -- Beyond Iteration Vectors: Instancewise Relational Abstract Domains -- Invited Talk -- Separation Logic and Program Analysis -- Beyond Reachability: Shape Abstraction in the Presence of Pointer Arithmetic -- Session 4 -- Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding -- Recency-Abstraction for Heap-Allocated Storage -- Interprocedural Shape Analysis with Separated Heap Abstractions -- Automated Verification of the Deutsch-Schorr-Waite Tree-Traversal Algorithm -- Invited Talk -- Shape Analysis for Low-Level Code -- Session 5 -- Catching and Identifying Bugs in Register Allocation -- Certificate Translation for Optimizing Compilers -- Analysis of Low-Level Code Using Cooperating Decompilers -- Session 6 -- Static Analysis for Java Servlets and JSP -- Cryptographically-Masked Flows -- Proving the Properties of Communicating Imperfectly-Clocked Synchronous Systems -- Session 7 -- Parametric and Termination-Sensitive Control Dependence -- Memory Leak Analysis by Contradiction -- Path-Sensitive Dataflow Analysis with Iterative Refinement.
In: Springer eBooks
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Invited Talk -- Unleashing the Power of Static Analysis -- Session 1 -- Static Analysis in Disjunctive Numerical Domains -- Static Analysis of Numerical Algorithms -- Static Analysis of String Manipulations in Critical Embedded C Programs -- Session 2 -- Abstract Regular Tree Model Checking of Complex Dynamic Data Structures -- Structural Invariants -- Existential Label Flow Inference Via CFL Reachability -- Session 3 -- Abstract Interpretation with Specialized Definitions -- Underapproximating Predicate Transformers -- Combining Widening and Acceleration in Linear Relation Analysis -- Beyond Iteration Vectors: Instancewise Relational Abstract Domains -- Invited Talk -- Separation Logic and Program Analysis -- Beyond Reachability: Shape Abstraction in the Presence of Pointer Arithmetic -- Session 4 -- Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding -- Recency-Abstraction for Heap-Allocated Storage -- Interprocedural Shape Analysis with Separated Heap Abstractions -- Automated Verification of the Deutsch-Schorr-Waite Tree-Traversal Algorithm -- Invited Talk -- Shape Analysis for Low-Level Code -- Session 5 -- Catching and Identifying Bugs in Register Allocation -- Certificate Translation for Optimizing Compilers -- Analysis of Low-Level Code Using Cooperating Decompilers -- Session 6 -- Static Analysis for Java Servlets and JSP -- Cryptographically-Masked Flows -- Proving the Properties of Communicating Imperfectly-Clocked Synchronous Systems -- Session 7 -- Parametric and Termination-Sensitive Control Dependence -- Memory Leak Analysis by Contradiction -- Path-Sensitive Dataflow Analysis with Iterative Refinement.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in