An appreciation of the work of Reinhard Wilhelm | p. 1 |
New developments in WCET analysis | p. 12 |
Realistic worst-case execution time analysis in the context of pervasive system verification | p. 53 |
Lazy execution of boolean queries | p. 82 |
Cryptographic protocol verification using tractable classes of horn clauses | p. 97 |
Infering ownership types for encapsulated object-oriented program components | p. 120 |
ViDoC- visual design of optimizing compilers | p. 145 |
Abstract interpretation for worst and average case analysis | p. 160 |
Grammar analysis and parsing by abstract interpretation | p. 175 |
Ensuring properties of interaction systems | p. 201 |
On the expressive power of live sequence charts | p. 225 |
Refinement-based verification for possibly-cyclic lists | p. 247 |
Abstract counterexample-based refinement for powerset domains | p. 273 |
Types from control flow analysis | p. 293 |
Data flow analysis for CCS | p. 311 |
Towards a source level compiler : source level modulo scheduling | p. 328 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.