Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

232 Publications


2009 | Conference Paper | IST-REx-ID: 4360
Wies, T., Piskac, R., & Kuncak, V. (2009). Combining Theories with Shared Set Operations (pp. 366–382). Presented at the FroCoS: Frontiers of Combining Systems, Springer. https://doi.org/1558
View | DOI
 

2009 | Thesis | IST-REx-ID: 4363
Singh, V. (2009). Formalizing and Verifying Transactional Memories. Formalizing and Verifying Transactional Memories. EPFL Lausanne.
View
 

2009 | Conference Paper | IST-REx-ID: 4375
Lahiri, S., Qadeer, S., Galeotti, J., Voung, J., & Wies, T. (2009). Intra-module Inference (pp. 493–508). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/1555
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4377
Hoenicke, J., Leino, K. R., Podelski, A., Schäf, M., & Wies, T. (2009). It’s Doomed; We Can Prove It (pp. 338–353). Presented at the FM: Formal Methods, Springer. https://doi.org/1557
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4383 | OA
Guerraoui, R., Henzinger, T. A., & Singh, V. (2009). Software transactional memory on relaxed memory models (Vol. 5643, pp. 321–336). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/10.1007/978-3-642-02658-4_26
View | Files available | DOI
 

2009 | Conference Paper | IST-REx-ID: 4385
Dragojevic, A., Guerraoui, R., Singh, A., & Singh, V. (2009). Preventing versus curing: avoiding conflicts in transactional memories (pp. 7–16). Presented at the POPL: Principles of Programming Languages, ACM. https://doi.org/1533
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4376
Lublinerman, R., Chaudhuri, S., & Cerny, P. (2009). Parallel programming with object assemblies (pp. 61–80). Presented at the Oopsla Object Oriented Programming Systems Languages and Applications, ACM. https://doi.org/1546
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4391
Cerny, P., & Alur, R. (2009). Automated Analysis of Java Methods for Confidentiality (pp. 173–187). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/1548
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4403 | OA
Alur, R., Cerny, P., & Weinstein, S. (2009). Algorithmic analysis of array-accessing programs (Vol. 5771, pp. 86–101). Presented at the CSL: Computer Science Logic, Coimbra, Portugal: Springer. https://doi.org/10.1007/978-3-642-04027-6_9
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2009 | Conference Paper | IST-REx-ID: 4453 | OA
Henzinger, T. A., Mateescu, M., & Wolf, V. (2009). Sliding-window abstraction for infinite Markov chains (Vol. 5643, pp. 337–352). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/10.1007/978-3-642-02658-4_27
View | Files available | DOI | Download (ext.)
 

Filters and Search Terms

year=2009

Search

Filter Publications