next up previous
Next: About this document ... Up: High-Confidence Operating Systems 1 Previous: 5 Status


R. Alur, R. Grosu, and M. McDougall.
Efficient reachability analysis of hierarchical reactive machines.
In Computer Aided Verification, 12th International Conference, LNCS 1855, pages 280-295. Springer, 2000.

T. Ball, R. Majumdar, T. Millstein, and S. K. Rajamani.
Automatic predicate abstraction of C programs.
In PLDI 2001, SIGPLAN Notices 36(5), pages 203-213, 2001.

J.C. Corbett, M.B. Dwyer, J. Hatcliff, S. Laubach, C.S. Pasareanu, Robby, and H. Zheng.
Bandera: Extracting finite-state models from java source code.
In Proceedings of 22nd International Conference on Software Engineering, pages 439-448, 2000.

D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf.
Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code.
In Proceedings of the 18th ACM Symposium on Operating System Principles (SOSP 2001), Chateau Lake Louise, Banff, Canada, October 2001. ACM SIGOPS.

R. Grosu, Y.A. Liu, S.A. Smolka, S.D. Stoller, and J. Yan.
Automated software engineering using concurrent class machines.
In Proceedings of ASE'01, the 16th IEEE International Conference on Automated Software Engineering. IEEE, 2001.

A. Kolawa and A. Hicken.
Insure++: A Tool to Support Total Quality Software., March 2001.

S. Savage, M. Burrows, G. Nelson, P. Sobalvarro, and T. Anderson.
ERASER: A Dynamic Data Race Detector for Multithreaded Programs.
ACM Transactions on Computer Systems, 15(4):391-411, 1997.

A. Tevanian and C. Minshall.
File System Exerciser., 1991.

Erez Zadok 2002-06-30