123
click to vote
ESOP
15 years 10 months ago
2010 Springer
In search for a foundational framework for reasoning about observable behavior of programs that may not terminate, we have previously devised a trace-based big-step semantics for W...
119
click to vote
ESOP
15 years 10 months ago
2010 Springer
Abstract. Embedded information assurance applications that are critical to national and international infrastructures, must often adhere to certification regimes that require infor...
106
click to vote
ESOP
15 years 10 months ago
2010 Springer
Abstract. We present a framework that automatically produces suggestions to resolve type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive s...
ESOP
15 years 10 months ago
2010 Springer
In 2003, Hofmann and Jost introduced a type system that uses a potential-based amortized analysis to infer bounds on the resource consumption of (first-order) functional programs. ...
117
click to vote
ESOP
15 years 10 months ago
2010 Springer
Abstract. A verified compiler is an integral part of every security infrastructure. Previous work has come up with formal semantics for sequential and concurrent variants of Java a...
|