Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

7627 Publications


2009 | Conference Paper | IST-REx-ID: 4376
Lublinerman, R., Chaudhuri, S., & Cerny, P. (2009). Parallel programming with object assemblies (pp. 61–80). Presented at the Oopsla Object Oriented Programming Systems Languages and Applications, ACM. https://doi.org/1546
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4377
Hoenicke, J., Leino, K. R., Podelski, A., Schäf, M., & Wies, T. (2009). It’s Doomed; We Can Prove It (pp. 338–353). Presented at the FM: Formal Methods, Springer. https://doi.org/1557
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4383 | OA
Guerraoui, R., Henzinger, T. A., & Singh, V. (2009). Software transactional memory on relaxed memory models (Vol. 5643, pp. 321–336). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/10.1007/978-3-642-02658-4_26
View | Files available | DOI
 

2009 | Conference Paper | IST-REx-ID: 4385
Dragojevic, A., Guerraoui, R., Singh, A., & Singh, V. (2009). Preventing versus curing: avoiding conflicts in transactional memories (pp. 7–16). Presented at the POPL: Principles of Programming Languages, ACM. https://doi.org/1533
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 4391
Cerny, P., & Alur, R. (2009). Automated Analysis of Java Methods for Confidentiality (pp. 173–187). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/1548
View | DOI
 

Search

Filter Publications