Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

7350 Publications


2009 | Journal Article | IST-REx-ID: 4357
Bollback JP, Huelsenbeck J. 2009. Parallel genetic evolution within and between bacteriophage species of varying degrees of divergence. Genetics. 181(1), 225–234.
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4360
Wies T, Piskac R, Kuncak V. 2009. Combining Theories with Shared Set Operations. FroCoS: Frontiers of Combining Systems, LNCS 5749, , 366–382.
View | DOI
 

2009 | Thesis | IST-REx-ID: 4363
Singh V. 2009. Formalizing and Verifying Transactional Memories. EPFL Lausanne.
View
 

2009 | Conference Paper | IST-REx-ID: 4365
Seghir M, Podelski A, Wies T. 2009. Abstraction Refinement for Quantified Array Assertions. SAS: Static Analysis Symposium, LNCS 5673, , 3–18.
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4375
Lahiri S, Qadeer S, Galeotti J, Voung J, Wies T. 2009. Intra-module Inference. CAV: Computer Aided Verification, LNCS 5643, , 493–508.
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4376
Lublinerman R, Chaudhuri S, Cerny P. 2009. Parallel programming with object assemblies. Oopsla Object Oriented Programming Systems Languages and Applications, 61–80.
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4377
Hoenicke J, Leino KR, Podelski A, Schäf M, Wies T. 2009. It’s Doomed; We Can Prove It. FM: Formal Methods, LNCS 5850, , 338–353.
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4383 | OA
Guerraoui R, Henzinger TA, Singh V. 2009. Software transactional memory on relaxed memory models. CAV: Computer Aided Verification, LNCS, vol. 5643, 321–336.
View | Files available | DOI
 

2009 | Conference Paper | IST-REx-ID: 4385
Dragojevic A, Guerraoui R, Singh A, Singh V. 2009. Preventing versus curing: avoiding conflicts in transactional memories. POPL: Principles of Programming Languages, 7–16.
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4391
Cerny P, Alur R. 2009. Automated Analysis of Java Methods for Confidentiality. CAV: Computer Aided Verification, LNCS, , 173–187.
View | DOI
 

Search

Filter Publications