Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Autorenporträt
Chris Hankin, Imperial College London, UK / Igor Siveroni, Imperial College London, UK
Inhaltsangabe
Invited Talks.- Algorithmic Game Semantics and Static Analysis.- From Typed Process Calculi to Source-Based Security.- Contributed Papers.- Widening Operators for Weakly-Relational Numeric Abstractions.- Generation of Basic Semi-algebraic Invariants Using Convex Polyhedra.- Inference of Well-Typings for Logic Programs with Application to Termination Analysis.- Memory Space Conscious Loop Iteration Duplication for Reliable Execution.- Memory Usage Verification for OO Programs.- Abstraction Refinement for Termination.- Data-Abstraction Refinement: A Game Semantic Approach.- Locality-Based Abstractions.- Type-Safe Optimisation of Plugin Architectures.- Using Dependent Types to Certify the Safety of Assembly Code.- The PER Model of Abstract Non-interference.- A Relational Abstraction for Functions.- Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis.- Banshee: A Scalable Constraint-Based Analysis Toolkit.- A Generic Framework for Interprocedural Analysis of Numerical Properties.- Finding Basic Block and Variable Correspondence.- Boolean Heaps.- Interprocedural Shape Analysis for Cutpoint-Free Programs.- Understanding the Origin of Alarms in Astrée.- Pair-Sharing Analysis of Object-Oriented Programs.- Exploiting Sparsity in Polyhedral Analysis.- Secure Information Flow as a Safety Problem.
Invited Talks.- Algorithmic Game Semantics and Static Analysis.- From Typed Process Calculi to Source-Based Security.- Contributed Papers.- Widening Operators for Weakly-Relational Numeric Abstractions.- Generation of Basic Semi-algebraic Invariants Using Convex Polyhedra.- Inference of Well-Typings for Logic Programs with Application to Termination Analysis.- Memory Space Conscious Loop Iteration Duplication for Reliable Execution.- Memory Usage Verification for OO Programs.- Abstraction Refinement for Termination.- Data-Abstraction Refinement: A Game Semantic Approach.- Locality-Based Abstractions.- Type-Safe Optimisation of Plugin Architectures.- Using Dependent Types to Certify the Safety of Assembly Code.- The PER Model of Abstract Non-interference.- A Relational Abstraction for Functions.- Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis.- Banshee: A Scalable Constraint-Based Analysis Toolkit.- A Generic Framework for Interprocedural Analysis of Numerical Properties.- Finding Basic Block and Variable Correspondence.- Boolean Heaps.- Interprocedural Shape Analysis for Cutpoint-Free Programs.- Understanding the Origin of Alarms in Astrée.- Pair-Sharing Analysis of Object-Oriented Programs.- Exploiting Sparsity in Polyhedral Analysis.- Secure Information Flow as a Safety Problem.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309