Next: About this document ...
Up: High-Confidence Operating Systems 1
Previous: 5 Status
-
- 1
-
R. Alur, R. Grosu, and M. McDougall.
Efficient reachability analysis of hierarchical reactive machines.
In Computer Aided Verification, 12th International Conference,
LNCS 1855, pages 280-295. Springer, 2000.
- 2
-
T. Ball, R. Majumdar, T. Millstein, and S. K. Rajamani.
Automatic predicate abstraction of C programs.
In PLDI 2001, SIGPLAN Notices 36(5), pages 203-213, 2001.
- 3
-
J.C. Corbett, M.B. Dwyer, J. Hatcliff, S. Laubach, C.S. Pasareanu, Robby, and
H. Zheng.
Bandera: Extracting finite-state models from java source code.
In Proceedings of 22nd International Conference on Software
Engineering, pages 439-448, 2000.
- 4
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf.
Bugs as Deviant Behavior: A General Approach to Inferring
Errors in Systems Code.
In Proceedings of the 18th ACM Symposium on Operating System
Principles (SOSP 2001), Chateau Lake Louise, Banff, Canada, October 2001.
ACM SIGOPS.
- 5
-
R. Grosu, Y.A. Liu, S.A. Smolka, S.D. Stoller, and J. Yan.
Automated software engineering using concurrent class machines.
In Proceedings of ASE'01, the 16th IEEE International Conference
on Automated Software Engineering. IEEE, 2001.
- 6
-
A. Kolawa and A. Hicken.
Insure++: A Tool to Support Total Quality Software.
http://www.parasoft.com/insure/papers/tech.htm, March 2001.
- 7
-
S. Savage, M. Burrows, G. Nelson, P. Sobalvarro, and T. Anderson.
ERASER: A Dynamic Data Race Detector for Multithreaded Programs.
ACM Transactions on Computer Systems, 15(4):391-411, 1997.
- 8
-
A. Tevanian and C. Minshall.
File System Exerciser.
http://www.codemonkey.org.uk/cruft/fsx-linux.c, 1991.
Erez Zadok
2002-06-30