From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Symbolic path simulation in path-sensitive dataflow analysis., , и . PASTE, стр. 52-58. ACM, (2005)Software validation via scalable path-sensitive value flow analysis., , , и . ISSTA, стр. 12-22. ACM, (2004)Unleashing the Power of Static Analysis.. SAS, том 4134 из Lecture Notes in Computer Science, стр. 1-2. Springer, (2006)Formal Specifications on Industrial-Strength Code-From Myth to Reality.. CAV, том 4144 из Lecture Notes in Computer Science, стр. 1. Springer, (2006)Semantic Foundations of Binding Time Analysis for Imperative Programs., , и . PEPM, стр. 100-110. ACM Press, (1995)Scalable context-sensitive flow analysis using instantiation constraints., , и . PLDI, стр. 253-263. ACM, (2000)Unification-based pointer analysis with directional assignments.. PLDI, стр. 35-46. ACM, (2000)The Use of Program Profiling for Software Maintenance with Applications to the Year 2000 Problem., , , и . ESEC / SIGSOFT FSE, том 1301 из Lecture Notes in Computer Science, стр. 432-449. Springer, (1997)Perracotta: mining temporal API rules from imperfect traces., , , , и . ICSE, стр. 282-291. ACM, (2006)Path-Sensitive Dataflow Analysis with Iterative Refinement., , и . SAS, том 4134 из Lecture Notes in Computer Science, стр. 425-442. Springer, (2006)