Abstract is missing.
- Efficient Algorithms for pre:::*::: and post:::*::: on Interprocedural Parallel Flow GraphsJavier Esparza, Andreas Podelski. 1-11 [doi]
- Temporal Abstract InterpretationPatrick Cousot, Radhia Cousot. 12-25 [doi]
- A Framework for Combining Analysis and VerificationNevin Heintze, Joxan Jaffar, Razvan Voicu. 26-39 [doi]
- Transforming Out Timing LeaksJohan Agat. 40-53 [doi]
- Enforcing Trace Properties by Program TransformationThomas Colcombet, Pascal Fradet. 54-66 [doi]
- On the Complexity of Flow-Sensitive Dataflow AnalysesRobert Muth, Saumya K. Debray. 67-80 [doi]
- Projection Merging: Reducing Redundancies in Inclusion Constraint GraphsZhendong Su, Manuel Fähndrich, Alexander Aiken. 81-95 [doi]
- (Optimal) Duplication is not Elementary RecursiveAndrea Asperti, Paolo Coppola, Simone Martini. 96-107 [doi]
- Implicit Parameters: Dynamic Scoping with Static TypesJeffrey R. Lewis, John Launchbury, Erik Meijer, Mark Shields. 108-118 [doi]
- A New Approach to Generic Functional ProgrammingRalf Hinze. 119-132 [doi]
- First-Class Macros have TypesAlan Bawden. 133-141 [doi]
- Shape Analysis for Mobile AmbientsHanne Riis Nielson, Flemming Nielson. 142-154 [doi]
- Semantics-Preserving Procedure ExtractionRaghavan Komondoor, Susan Horwitz. 155-169 [doi]
- Sparse Code MotionOliver Rüthing, Jens Knoop, Bernhard Steffen. 170-183 [doi]
- Resource Bound CertificationKarl Crary, Stephanie Weirich. 184-198 [doi]
- Type Systems for Distributed Data StructuresBen Liblit, Alexander Aiken. 199-213 [doi]
- Deciding Type Equivalence with Singleton KindsChristopher A. Stone, Robert Harper. 214-227 [doi]
- Type Elaboration and Subtype Completion for Java BytecodeTodd B. Knoblock, Jakob Rehof. 228-242 [doi]
- A Semantic Model of Types and Machine Instuctions for Proof-Carrying CodeAndrew W. Appel, Amy P. Felty. 243-253 [doi]
- A Type System for Expressive Security PoliciesDavid Walker. 254-267 [doi]
- Verifying Secrets and Relative SecrecyDennis M. Volpano, Geoffrey Smith. 268-276 [doi]
- A Debate on Language and Tool Support for Design PatternsCraig Chambers, Bill Harrison, John M. Vlissides. 277-289 [doi]
- A Type System for Dynamic Web DocumentsAnders Sandholm, Michael I. Schwartzbach. 290-301 [doi]
- Authentication Primitives and Their CompilationMartín Abadi, Cédric Fournet, Georges Gonthier. 302-315 [doi]
- Generalized Certificate RevocationCarl A. Gunter, Trevor Jim. 316-329 [doi]
- Paths vs. Trees in Set-Based Program AnalysisWitold Charatonik, Andreas Podelski, Jean-Marc Talbot. 330-337 [doi]
- Analytic Constraint Solving and Interval ArithmeticTimothy J. Hickey. 338-351 [doi]
- Controlling Interference in AmbientsFrancesca Levi, Davide Sangiorgi. 352-364 [doi]
- Anytime, Anywhere: Modal Logics for Mobile AmbientsLuca Cardelli, Andrew D. Gordon. 365-377 [doi]
- Reducing Sweep Time for a Nearly Empty HeapYoo C. Chung, Soo-Mook Moon, Kemal Ebcioglu, Dan Sahlin. 378-389 [doi]
- Modular Refinement of Hierarchic Reactive MachinesRajeev Alur, Radu Grosu. 390-402 [doi]