From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unleashing the Power of Static Analysis.. SAS, том 4134 из Lecture Notes in Computer Science, стр. 1-2. Springer, (2006)Formal Specifications on Industrial-Strength Code-From Myth to Reality.. CAV, том 4144 из Lecture Notes in Computer Science, стр. 1. Springer, (2006)Symbolic path simulation in path-sensitive dataflow analysis., , и . PASTE, стр. 52-58. ACM, (2005)Software validation via scalable path-sensitive value flow analysis., , , и . ISSTA, стр. 12-22. ACM, (2004)Perracotta: mining temporal API rules from imperfect traces., , , , и . ICSE, стр. 282-291. ACM, (2006)Path-Sensitive Dataflow Analysis with Iterative Refinement., , и . SAS, том 4134 из Lecture Notes in Computer Science, стр. 425-442. Springer, (2006)Static Analysis of Large Programs: Some Experiences (Abstract of Invited Talk).. PEPM, стр. 1. ACM, (2000)Righting Software., , , , , , , и . IEEE Softw., 21 (3): 92-100 (2004)Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis., , , , , , и . SAS, том 2477 из Lecture Notes in Computer Science, стр. 230-246. Springer, (2002)Semantic Foundations of Binding Time Analysis for Imperative Programs., , и . PEPM, стр. 100-110. ACM Press, (1995)