next up previous
Next: About this document ... Up: High-Confidence Operating Systems 1 Previous: 5 Status

Bibliography

1
R. Alur, R. Grosu, and M. McDougall.
Efficient reachability analysis of hierarchical reactive machines.
In Computer Aided Verification, 12th International Conference, LNCS 1855, pages 280-295. Springer, 2000.

2
T. Ball, R. Majumdar, T. Millstein, and S. K. Rajamani.
Automatic predicate abstraction of C programs.
In PLDI 2001, SIGPLAN Notices 36(5), pages 203-213, 2001.

3
J.C. Corbett, M.B. Dwyer, J. Hatcliff, S. Laubach, C.S. Pasareanu, Robby, and H. Zheng.
Bandera: Extracting finite-state models from java source code.
In Proceedings of 22nd International Conference on Software Engineering, pages 439-448, 2000.

4
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf.
Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code.
In Proceedings of the 18th ACM Symposium on Operating System Principles (SOSP 2001), Chateau Lake Louise, Banff, Canada, October 2001. ACM SIGOPS.

5
R. Grosu, Y.A. Liu, S.A. Smolka, S.D. Stoller, and J. Yan.
Automated software engineering using concurrent class machines.
In Proceedings of ASE'01, the 16th IEEE International Conference on Automated Software Engineering. IEEE, 2001.

6
A. Kolawa and A. Hicken.
Insure++: A Tool to Support Total Quality Software.
http://www.parasoft.com/insure/papers/tech.htm, March 2001.

7
S. Savage, M. Burrows, G. Nelson, P. Sobalvarro, and T. Anderson.
ERASER: A Dynamic Data Race Detector for Multithreaded Programs.
ACM Transactions on Computer Systems, 15(4):391-411, 1997.

8
A. Tevanian and C. Minshall.
File System Exerciser.
http://www.codemonkey.org.uk/cruft/fsx-linux.c, 1991.



Erez Zadok 2002-06-30