Databases Reference
In-Depth Information
[26] Javier Esparza, David Hansel, Peter Rossmanith, and Stefan Schwoon.
Ecient algorithms for model checking push down systems. In Pro-
ceedings of the International Conference on Computer Aided Verification
(CAV), pages 232{247, 2000.
[27] Javier Esparza, Stefan Kiefer, and Stefan Schwoon. Abstraction refine-
ment with Craig interpolation and symbolic pushdown systems. In Pro-
ceedings of the 12th International Conference on Tools and Algorithms
for the Construction and Analysis of Systems (TACAS), pages 489{503,
2006.
[28] Justin Forrester and Barton P. Miller. An empirical study of the robust-
ness of Windows NT applications using random testing. In Proceedings
of the USENIX Windows Systems Symposium, pages 69{78, 2000.
[29] Patrice Godefroid. Model checking for programming languages using
Verisoft. In Proceedings of the Symposium on Principles of Programming
Languages (POPL), pages 174{186, 1997.
[30] Gosta Grahne and Jianfei Zhu. Eciently using prefix-trees in mining
frequent itemsets. In IEEE ICDM Workshop on Frequent Itemset Mining
Implementations, 2003.
[31] Haryadi Gunawi, Cindy Rubio-Gonzalez, Andrea Arpaci-Dusseau, Remzi
Arpaci-Dusseau, and Ben Liblit. EIO: error handling is occasionally cor-
rect. In Proceedings of the USENIX Conference on File and Storage
Technology (FAST), pages 242{251, 2006.
[32] Jennifer Haddox, Gregory Kapfhammer, C. Michael, and Michael Schatz.
Testing commercial-off-the-shelf software components. In Proceedings of
the 18th International Conference and Exposition on Testing (ICET),
2001.
[33] T. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Software verifica-
tion with BLAST. In Proceedings of the Workshop on Model Checking
Software, pages 235{239, 2003.
[34] Thomas A. Henzinger, Ranjit Jhala, and Rupak Majumdar. Permissive
interfaces. In Proceedings of the European Software Engineering Confer-
ence and the ACM SIGSOFT Symposium on the Foundations of Software
Engineering (ESEC/FSE), pages 31{40, 2005.
[35] John Hopcroft and Jeffrey Ullman. Introduction to Automata Theory,
Languages and Computation. Addison-Wesley, 1979.
[36] Philip Koopman and John DeVale. The exception handling effectiveness
of POSIX operating systems. IEEE Transactions on Software Engineer-
ing (TSE), 26(9):837{848, 2000.
 
Search WWH ::




Custom Search