Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Herstellerkennzeichnung
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Chris Hankin, Imperial College London, UK / Igor Siveroni, Imperial College London, UK
Inhaltsangabe
Invited Talks.- Algorithmic Game Semantics and Static Analysis.- From Typed Process Calculi to Source-Based Security.- Contributed Papers.- Widening Operators for Weakly-Relational Numeric Abstractions.- Generation of Basic Semi-algebraic Invariants Using Convex Polyhedra.- Inference of Well-Typings for Logic Programs with Application to Termination Analysis.- Memory Space Conscious Loop Iteration Duplication for Reliable Execution.- Memory Usage Verification for OO Programs.- Abstraction Refinement for Termination.- Data-Abstraction Refinement: A Game Semantic Approach.- Locality-Based Abstractions.- Type-Safe Optimisation of Plugin Architectures.- Using Dependent Types to Certify the Safety of Assembly Code.- The PER Model of Abstract Non-interference.- A Relational Abstraction for Functions.- Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis.- Banshee: A Scalable Constraint-Based Analysis Toolkit.- A Generic Framework for Interprocedural Analysis of Numerical Properties.- Finding Basic Block and Variable Correspondence.- Boolean Heaps.- Interprocedural Shape Analysis for Cutpoint-Free Programs.- Understanding the Origin of Alarms in Astrée.- Pair-Sharing Analysis of Object-Oriented Programs.- Exploiting Sparsity in Polyhedral Analysis.- Secure Information Flow as a Safety Problem.
Invited Talks.- Algorithmic Game Semantics and Static Analysis.- From Typed Process Calculi to Source-Based Security.- Contributed Papers.- Widening Operators for Weakly-Relational Numeric Abstractions.- Generation of Basic Semi-algebraic Invariants Using Convex Polyhedra.- Inference of Well-Typings for Logic Programs with Application to Termination Analysis.- Memory Space Conscious Loop Iteration Duplication for Reliable Execution.- Memory Usage Verification for OO Programs.- Abstraction Refinement for Termination.- Data-Abstraction Refinement: A Game Semantic Approach.- Locality-Based Abstractions.- Type-Safe Optimisation of Plugin Architectures.- Using Dependent Types to Certify the Safety of Assembly Code.- The PER Model of Abstract Non-interference.- A Relational Abstraction for Functions.- Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis.- Banshee: A Scalable Constraint-Based Analysis Toolkit.- A Generic Framework for Interprocedural Analysis of Numerical Properties.- Finding Basic Block and Variable Correspondence.- Boolean Heaps.- Interprocedural Shape Analysis for Cutpoint-Free Programs.- Understanding the Origin of Alarms in Astrée.- Pair-Sharing Analysis of Object-Oriented Programs.- Exploiting Sparsity in Polyhedral Analysis.- Secure Information Flow as a Safety Problem.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826