callback( { "result":{ "query":":facetid:toc:\"db/conf/sas/sas2014.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"67.64" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"21", "@dc":"21", "@oc":"21", "@id":"43422256", "text":":facetid:toc:db/conf/sas/sas2014.bht" } }, "hits":{ "@total":"21", "@computed":"21", "@sent":"21", "@first":"0", "hit":[{ "@score":"1", "@id":"3935790", "info":{"authors":{"author":[{"@pid":"a/PAAbdulla","text":"Parosh Aziz Abdulla"},{"@pid":"79/4476","text":"Frédéric Haziza"},{"@pid":"64/6177","text":"Lukás Holík"}]},"title":"Block Me If You Can! - Context-Sensitive Parameterized Verification.","venue":"SAS","pages":"1-17","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/AbdullaHH14","doi":"10.1007/978-3-319-10936-7_1","ee":"https://doi.org/10.1007/978-3-319-10936-7_1","url":"https://dblp.org/rec/conf/sas/AbdullaHH14"}, "url":"URL#3935790" }, { "@score":"1", "@id":"3935791", "info":{"authors":{"author":[{"@pid":"a/ElviraAlbert","text":"Elvira Albert"},{"@pid":"82/4900","text":"Jesús Correas Fernández"},{"@pid":"27/9116","text":"Guillermo Román-Díez"}]},"title":"Peak Cost Analysis of Distributed Systems.","venue":"SAS","pages":"18-33","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/AlbertFR14","doi":"10.1007/978-3-319-10936-7_2","ee":"https://doi.org/10.1007/978-3-319-10936-7_2","url":"https://dblp.org/rec/conf/sas/AlbertFR14"}, "url":"URL#3935791" }, { "@score":"1", "@id":"3935792", "info":{"authors":{"author":[{"@pid":"150/7773","text":"Alexey Bakhirkin"},{"@pid":"61/1623","text":"Josh Berdine"},{"@pid":"p/NPiterman","text":"Nir Piterman"}]},"title":"Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction.","venue":"SAS","pages":"34-50","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/BakhirkinBP14","doi":"10.1007/978-3-319-10936-7_3","ee":"https://doi.org/10.1007/978-3-319-10936-7_3","url":"https://dblp.org/rec/conf/sas/BakhirkinBP14"}, "url":"URL#3935792" }, { "@score":"1", "@id":"3935793", "info":{"authors":{"author":[{"@pid":"03/2520","text":"Frédéric Besson"},{"@pid":"69/4418","text":"Thomas P. Jensen"},{"@pid":"150/7776","text":"Pierre Vittet"}]},"title":"SawjaCard: A Static Analysis Tool for Certifying Java Card Applications.","venue":"SAS","pages":"51-67","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/BessonJV14","doi":"10.1007/978-3-319-10936-7_4","ee":"https://doi.org/10.1007/978-3-319-10936-7_4","url":"https://dblp.org/rec/conf/sas/BessonJV14"}, "url":"URL#3935793" }, { "@score":"1", "@id":"3935794", "info":{"authors":{"author":[{"@pid":"77/3809","text":"James Brotherston"},{"@pid":"86/4535","text":"Nikos Gorogiannis"}]},"title":"Cyclic Abduction of Inductively Defined Safety and Termination Preconditions.","venue":"SAS","pages":"68-84","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/BrotherstonG14","doi":"10.1007/978-3-319-10936-7_5","ee":"https://doi.org/10.1007/978-3-319-10936-7_5","url":"https://dblp.org/rec/conf/sas/BrotherstonG14"}, "url":"URL#3935794" }, { "@score":"1", "@id":"3935795", "info":{"authors":{"author":[{"@pid":"61/7168","text":"Aleksandar Chakarov"},{"@pid":"82/1542","text":"Sriram Sankaranarayanan 0001"}]},"title":"Expectation Invariants for Probabilistic Program Loops as Fixed Points.","venue":"SAS","pages":"85-100","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/ChakarovS14","doi":"10.1007/978-3-319-10936-7_6","ee":"https://doi.org/10.1007/978-3-319-10936-7_6","url":"https://dblp.org/rec/conf/sas/ChakarovS14"}, "url":"URL#3935795" }, { "@score":"1", "@id":"3935796", "info":{"authors":{"author":[{"@pid":"76/1885","text":"Yu-Fang Chen 0001"},{"@pid":"03/11470","text":"Chiao Hsieh"},{"@pid":"30/3940-1","text":"Ming-Hsien Tsai 0001"},{"@pid":"36/6517","text":"Bow-Yaw Wang"},{"@pid":"27/3868","text":"Farn Wang"}]},"title":"Verifying Recursive Programs Using Intraprocedural Analyzers.","venue":"SAS","pages":"118-133","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/ChenHTWW14","doi":"10.1007/978-3-319-10936-7_8","ee":"https://doi.org/10.1007/978-3-319-10936-7_8","url":"https://dblp.org/rec/conf/sas/ChenHTWW14"}, "url":"URL#3935796" }, { "@score":"1", "@id":"3935797", "info":{"authors":{"author":[{"@pid":"77/303","text":"Liqian Chen"},{"@pid":"150/7774","text":"Jiangchao Liu"},{"@pid":"68/1479","text":"Antoine Miné"},{"@pid":"k/DeepakKapur","text":"Deepak Kapur"},{"@pid":"64/856-1","text":"Ji Wang 0001"}]},"title":"An Abstract Domain to Infer Octagonal Constraints with Absolute Value.","venue":"SAS","pages":"101-117","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/ChenLMKW14","doi":"10.1007/978-3-319-10936-7_7","ee":"https://doi.org/10.1007/978-3-319-10936-7_7","url":"https://dblp.org/rec/conf/sas/ChenLMKW14"}, "url":"URL#3935797" }, { "@score":"1", "@id":"3935798", "info":{"authors":{"author":[{"@pid":"61/11109","text":"Arlen Cox"},{"@pid":"68/6029","text":"Bor-Yuh Evan Chang"},{"@pid":"r/XavierRival","text":"Xavier Rival"}]},"title":"Automatic Analysis of Open Objects in Dynamic Language Programs.","venue":"SAS","pages":"134-150","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/CoxCR14","doi":"10.1007/978-3-319-10936-7_9","ee":"https://doi.org/10.1007/978-3-319-10936-7_9","url":"https://dblp.org/rec/conf/sas/CoxCR14"}, "url":"URL#3935798" }, { "@score":"1", "@id":"3935799", "info":{"authors":{"author":[{"@pid":"85/7084","text":"Khalil Ghorbal"},{"@pid":"144/4883","text":"Andrew Sogokon"},{"@pid":"55/950","text":"André Platzer"}]},"title":"Invariance of Conjunctions of Polynomial Equalities for Algebraic Differential Equations.","venue":"SAS","pages":"151-167","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/GhorbalSP14","doi":"10.1007/978-3-319-10936-7_10","ee":"https://doi.org/10.1007/978-3-319-10936-7_10","url":"https://dblp.org/rec/conf/sas/GhorbalSP14"}, "url":"URL#3935799" }, { "@score":"1", "@id":"3935800", "info":{"authors":{"author":[{"@pid":"17/8138","text":"Guillaume Iooss"},{"@pid":"93/5457","text":"Christophe Alias"},{"@pid":"r/SanjayVRajopadhye","text":"Sanjay V. Rajopadhye"}]},"title":"On Program Equivalence with Reductions.","venue":"SAS","pages":"168-183","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/IoossAR14","doi":"10.1007/978-3-319-10936-7_11","ee":"https://doi.org/10.1007/978-3-319-10936-7_11","url":"https://dblp.org/rec/conf/sas/IoossAR14"}, "url":"URL#3935800" }, { "@score":"1", "@id":"3935801", "info":{"authors":{"author":[{"@pid":"57/2881","text":"Woosuk Lee"},{"@pid":"13/7537","text":"Hakjoo Oh"},{"@pid":"y/KwangkeunYi","text":"Kwangkeun Yi"}]},"title":"A Progress Bar for Static Analyzers.","venue":"SAS","pages":"184-200","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/LeeOY14","doi":"10.1007/978-3-319-10936-7_12","ee":"https://doi.org/10.1007/978-3-319-10936-7_12","url":"https://dblp.org/rec/conf/sas/LeeOY14"}, "url":"URL#3935801" }, { "@score":"1", "@id":"3935802", "info":{"authors":{"author":[{"@pid":"43/10082","text":"Magnus Madsen"},{"@pid":"55/6739","text":"Anders Møller"}]},"title":"Sparse Dataflow Analysis with Pointers and Reachability.","venue":"SAS","pages":"201-218","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/MadsenM14","doi":"10.1007/978-3-319-10936-7_13","ee":"https://doi.org/10.1007/978-3-319-10936-7_13","url":"https://dblp.org/rec/conf/sas/MadsenM14"}, "url":"URL#3935802" }, { "@score":"1", "@id":"3935803", "info":{"authors":{"author":[{"@pid":"99/1246","text":"Louis Mandel"},{"@pid":"00/8369","text":"Cédric Pasteur"}]},"title":"Reactivity of Cooperative Systems - Application to ReactiveML.","venue":"SAS","pages":"219-236","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/MandelP14","doi":"10.1007/978-3-319-10936-7_14","ee":"https://doi.org/10.1007/978-3-319-10936-7_14","url":"https://dblp.org/rec/conf/sas/MandelP14"}, "url":"URL#3935803" }, { "@score":"1", "@id":"3935804", "info":{"authors":{"author":[{"@pid":"130/9902","text":"Yuri Meshman"},{"@pid":"131/0034","text":"Andrei Marian Dan"},{"@pid":"93/2189","text":"Martin T. Vechev"},{"@pid":"54/5133","text":"Eran Yahav"}]},"title":"Synthesis of Memory Fences via Refinement Propagation.","venue":"SAS","pages":"237-252","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/MeshmanDVY14","doi":"10.1007/978-3-319-10936-7_15","ee":"https://doi.org/10.1007/978-3-319-10936-7_15","url":"https://dblp.org/rec/conf/sas/MeshmanDVY14"}, "url":"URL#3935804" }, { "@score":"1", "@id":"3935805", "info":{"authors":{"author":[{"@pid":"m/DavidMonniaux","text":"David Monniaux"},{"@pid":"23/8898","text":"Peter Schrammel"}]},"title":"Speeding Up Logico-Numerical Strategy Iteration.","venue":"SAS","pages":"253-267","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/MonniauxS14","doi":"10.1007/978-3-319-10936-7_16","ee":"https://doi.org/10.1007/978-3-319-10936-7_16","url":"https://dblp.org/rec/conf/sas/MonniauxS14"}, "url":"URL#3935805" }, { "@score":"1", "@id":"3935806", "info":{"authors":{"author":[{"@pid":"78/7445","text":"Roopsha Samanta"},{"@pid":"86/7184","text":"Oswaldo Olivo"},{"@pid":"e/EAllenEmerson","text":"E. Allen Emerson"}]},"title":"Cost-Aware Automatic Program Repair.","venue":"SAS","pages":"268-284","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/SamantaOE14","doi":"10.1007/978-3-319-10936-7_17","ee":"https://doi.org/10.1007/978-3-319-10936-7_17","url":"https://dblp.org/rec/conf/sas/SamantaOE14"}, "url":"URL#3935806" }, { "@score":"1", "@id":"3935807", "info":{"authors":{"author":[{"@pid":"124/9001","text":"Antoine Toubhans"},{"@pid":"68/6029","text":"Bor-Yuh Evan Chang"},{"@pid":"r/XavierRival","text":"Xavier Rival"}]},"title":"An Abstract Domain Combinator for Separately Conjoining Memory Abstractions.","venue":"SAS","pages":"285-301","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/ToubhansCR14","doi":"10.1007/978-3-319-10936-7_18","ee":"https://doi.org/10.1007/978-3-319-10936-7_18","url":"https://dblp.org/rec/conf/sas/ToubhansCR14"}, "url":"URL#3935807" }, { "@score":"1", "@id":"3935808", "info":{"authors":{"author":[{"@pid":"130/9842","text":"Caterina Urban"},{"@pid":"68/1479","text":"Antoine Miné"}]},"title":"A Decision Tree Abstract Domain for Proving Conditional Termination.","venue":"SAS","pages":"302-318","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/UrbanM14","doi":"10.1007/978-3-319-10936-7_19","ee":"https://doi.org/10.1007/978-3-319-10936-7_19","url":"https://dblp.org/rec/conf/sas/UrbanM14"}, "url":"URL#3935808" }, { "@score":"1", "@id":"3935809", "info":{"authors":{"author":[{"@pid":"52/8557","text":"Sen Ye"},{"@pid":"58/10567","text":"Yulei Sui"},{"@pid":"x/JinglingXue","text":"Jingling Xue"}]},"title":"Region-Based Selective Flow-Sensitive Pointer Analysis.","venue":"SAS","pages":"319-336","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas/YeSX14","doi":"10.1007/978-3-319-10936-7_20","ee":"https://doi.org/10.1007/978-3-319-10936-7_20","url":"https://dblp.org/rec/conf/sas/YeSX14"}, "url":"URL#3935809" }, { "@score":"1", "@id":"3965174", "info":{"authors":{"author":[{"@pid":"m/MarkusMullerOhm","text":"Markus Müller-Olm"},{"@pid":"s/HelmutSeidl","text":"Helmut Seidl"}]},"title":"Static Analysis - 21st International Symposium, SAS 2014, Munich, Germany, September 11-13, 2014. Proceedings","venue":["SAS","Lecture Notes in Computer Science"],"volume":"8723","publisher":"Springer","year":"2014","type":"Editorship","key":"conf/sas/2014","doi":"10.1007/978-3-319-10936-7","ee":"https://doi.org/10.1007/978-3-319-10936-7","url":"https://dblp.org/rec/conf/sas/2014"}, "url":"URL#3965174" } ] } } } )