Static Analysis [electronic resource] : 13th International Symposium, SAS 2006, Seoul, Korea, August 29-31, 2006. Proceedings / edited by Kwangkeun Yi.

Contributor(s): Yi, Kwangkeun [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 4134Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006Description: XIII, 443 p. Also available online. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540377580Subject(s): Computer science | Software engineering | Logic design | Computer Science | Programming Languages, Compilers, Interpreters | Logics and Meanings of Programs | Software Engineering | Mathematical Logic and Formal Languages | Programming TechniquesAdditional physical formats: Printed edition:: No titleDDC classification: 005.13 LOC classification: QA76.7-76.73QA76.76.C65Online resources: Click here to access online
Contents:
Invited Talk -- Unleashing the Power of Static Analysis -- Session 1 -- Static Analysis in Disjunctive Numerical Domains -- Static Analysis of Numerical Algorithms -- Static Analysis of String Manipulations in Critical Embedded C Programs -- Session 2 -- Abstract Regular Tree Model Checking of Complex Dynamic Data Structures -- Structural Invariants -- Existential Label Flow Inference Via CFL Reachability -- Session 3 -- Abstract Interpretation with Specialized Definitions -- Underapproximating Predicate Transformers -- Combining Widening and Acceleration in Linear Relation Analysis -- Beyond Iteration Vectors: Instancewise Relational Abstract Domains -- Invited Talk -- Separation Logic and Program Analysis -- Beyond Reachability: Shape Abstraction in the Presence of Pointer Arithmetic -- Session 4 -- Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding -- Recency-Abstraction for Heap-Allocated Storage -- Interprocedural Shape Analysis with Separated Heap Abstractions -- Automated Verification of the Deutsch-Schorr-Waite Tree-Traversal Algorithm -- Invited Talk -- Shape Analysis for Low-Level Code -- Session 5 -- Catching and Identifying Bugs in Register Allocation -- Certificate Translation for Optimizing Compilers -- Analysis of Low-Level Code Using Cooperating Decompilers -- Session 6 -- Static Analysis for Java Servlets and JSP -- Cryptographically-Masked Flows -- Proving the Properties of Communicating Imperfectly-Clocked Synchronous Systems -- Session 7 -- Parametric and Termination-Sensitive Control Dependence -- Memory Leak Analysis by Contradiction -- Path-Sensitive Dataflow Analysis with Iterative Refinement.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK4420

Invited Talk -- Unleashing the Power of Static Analysis -- Session 1 -- Static Analysis in Disjunctive Numerical Domains -- Static Analysis of Numerical Algorithms -- Static Analysis of String Manipulations in Critical Embedded C Programs -- Session 2 -- Abstract Regular Tree Model Checking of Complex Dynamic Data Structures -- Structural Invariants -- Existential Label Flow Inference Via CFL Reachability -- Session 3 -- Abstract Interpretation with Specialized Definitions -- Underapproximating Predicate Transformers -- Combining Widening and Acceleration in Linear Relation Analysis -- Beyond Iteration Vectors: Instancewise Relational Abstract Domains -- Invited Talk -- Separation Logic and Program Analysis -- Beyond Reachability: Shape Abstraction in the Presence of Pointer Arithmetic -- Session 4 -- Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding -- Recency-Abstraction for Heap-Allocated Storage -- Interprocedural Shape Analysis with Separated Heap Abstractions -- Automated Verification of the Deutsch-Schorr-Waite Tree-Traversal Algorithm -- Invited Talk -- Shape Analysis for Low-Level Code -- Session 5 -- Catching and Identifying Bugs in Register Allocation -- Certificate Translation for Optimizing Compilers -- Analysis of Low-Level Code Using Cooperating Decompilers -- Session 6 -- Static Analysis for Java Servlets and JSP -- Cryptographically-Masked Flows -- Proving the Properties of Communicating Imperfectly-Clocked Synchronous Systems -- Session 7 -- Parametric and Termination-Sensitive Control Dependence -- Memory Leak Analysis by Contradiction -- Path-Sensitive Dataflow Analysis with Iterative Refinement.

There are no comments on this title.

to post a comment.
Share
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha