Abstract is missing.
- Analysis of Multithreaded ProgramsMartin C. Rinard. 1-19 [doi]
- Communication and Parallelism Introduction and Elimination in Imperative Concurrent ProgramsMiquel Bertran, Francesc-Xavier Babot, August Climent, Miquel Nicolau. 20-39 [doi]
- Using Slicing to Identify Duplication in Source CodeRaghavan Komondoor, Susan Horwitz. 40-56 [doi]
- Soft Scheduling for HardwareRichard Sharp, Alan Mycroft. 57-72 [doi]
- Effective Strictness Analysis with HORN ConstraintsKevin Glynn, Peter J. Stuckey, Martin Sulzmann. 73-92 [doi]
- Applying Static Analysis Techniques for Inferring Termination Conditions of Logic ProgramsFrédéric Mesnard, Ulrich Neumerkel. 93-110 [doi]
- An Abstract Analysis of the Probabilistic Termination of ProgramsDavid Monniaux. 111-126 [doi]
- Watchpoint Semantics: A Tool for Compositional and Focussed Static AnalysesFausto Spoto. 127-145 [doi]
- Parameterizing a Groundness Analysis of Logic ProgramsLunjin Lu. 146-164 [doi]
- Finite-Tree Analysis for Constraint Logic-Based LanguagesRoberto Bagnara, Roberta Gori, Patricia M. Hill, Enea Zaffanella. 165-184 [doi]
- Applications of Extended Static CheckingK. Rustan M. Leino. 185-193 [doi]
- Cleanness Checking of String Manipulations in C Programs via Integer AnalysisNurit Dor, Michael Rodeh, Shmuel Sagiv. 194-212 [doi]
- Solving Regular Tree Grammar Based ConstraintsYanhong A. Liu, Ning Li, Scott D. Stoller. 213-233 [doi]
- Static Analyses of the Precision of Floating-Point OperationsEric Goubault. 234-259 [doi]
- Estimating the Impact of Scalable Pointer Analysis on OptimizationManuvir Das, Ben Liblit, Manuel Fähndrich, Jakob Rehof. 260-278 [doi]
- Efficient Computation of Parameterized Pointer Information for Interprocedural AnalysesDonglin Liang, Mary Jean Harrold. 279-298 [doi]
- Parametric Optimization of Open Real-Time SystemsFarn Wang, Hsu-Chun Yen. 299-318 [doi]
- Embedding ChaosNatalia Sidorova, Martin Steffen. 319-334 [doi]
- Analyzing Fair Parametric Extended AutomataAhmed Bouajjani, Aurore Collomb-Annichini, Yassine Lakhnech, Mihaela Sighireanu. 335-355 [doi]
- Incompleteness, Counterexamples, and Refinements in Abstract Model-CheckingRoberto Giacobazzi, Elisa Quintarelli. 356-373 [doi]
- Language-Based Security: What s Needed and WhyFred B. Schneider. 374 [doi]
- A Behavioral Module System for the Pi-CalculusSriram K. Rajamani, Jakob Rehof. 375-394 [doi]
- An Abstract Interpretation Framework for Analysing Mobile AmbientsFrancesca Levi, Sergio Maffeis. 395-411 [doi]
- Abstract Interpretation-Based Static Analysis of Mobile AmbientsJérôme Feret. 412-430 [doi]
- Static Analysis and Software AssuranceDavid Wagner. 431 [doi]
- A Type and Effect Analysis of Security ProtocolsAndrew D. Gordon, Alan Jeffrey. 432-432 [doi]
- Abstracting Cryptographic Protocols by Prolog RulesBruno Blanchet. 433-436 [doi]
- Security-Typed Languages and Distributed ComputationAndrew C. Myers. 437-438 [doi]