BACK TO INDEX

Publications about 'verification'
Thesis
  1. V.-A. Nicolas. Preuves de propriétés de classes de programmes par dérivation systématique de jeux de test. PhD thesis, Université de Rennes I, Ifsic, Irisa, December 1998. [WWW ] Keyword(s): Software engineering, program verification, white-box testing, automated test data generation, program analysis, program schemes. [Abstract] [bibtex-entry]


Articles in journal or book chapters
  1. F. Besson, T. de Grenier de Latour, and T. Jensen. Interfaces for stack inspection. Journal of Functional Programming, 15(2):179--217, 2005. [WWW ] [Abstract] [bibtex-entry]


  2. David Cachera and Katell Morin-Allory. Verification of safety properties for parameterized regular systems. Trans. on Embedded Computing Systems, 4(2):228--266, 2005. [Abstract] [bibtex-entry]


  3. G. Feuillade, T. Genet, and V. Viet Triem Tong. Reachability Analysis over Term Rewriting Systems. Journal of Automated Reasoning, 33 (3-4):341-383, 2004. [WWW ] Keyword(s): Term Rewriting, Reachability, Tree Automata, Approximations, Verification, Timbuk, Abstract Interpretation. [Abstract] [bibtex-entry]


  4. D. Le Métayer, V.-A. Nicolas, and O. Ridoux. Programs, Properties, and Data: Exploring the Software Development Trilogy. IEEE Software, 15(6):75-81, November/December 1998. [WWW ] Keyword(s): Software engineering, testing, verification, program analysis, program learning. [Abstract] [bibtex-entry]


Conference articles
  1. David Cachera, Thomas Jensen, David Pichardie, and Gerardo Schneider. Certified Memory Usage Analysis. In Proc of 13th International Symposium on Formal Methods (FM'05), Lecture Notes in Computer Science, 2005. Springer-Verlag. [Abstract] [bibtex-entry]


  2. David Cachera and Katell Morin-Allory. Verification of Control Properties in the Polyhedral Model. In Proc. 1st MEMOCODE conference, Mont-St-Michel, France, June 2003. [WWW ] [bibtex-entry]


  3. T. Genet, T. Jensen, V. Kodati, and D. Pichardie. A Java Card CAP Converter in PVS. In Proceedings of the 2nd International Workshop on Compiler Optimization Meets Compiler Verification (COCV 2003), 2003. ENTCS 82(2). [WWW ] Keyword(s): Java, Java Card, CAP Format, Compiler, Verification, Proof Assistant, PVS. [bibtex-entry]


  4. T. Genet, Y.-M. Tang-Talpin, and V. Viet Triem Tong. Verification of Copy Protection Cryptographic Protocol using Approximations of Term Rewriting Systems. In In Proceedings of Workshop on Issues in the Theory of Security, 2003. [WWW ] Keyword(s): Cryptographic Protocol, Verification, Term Rewriting, Reachability, Approximation, Timbuk. [bibtex-entry]


  5. T. Genet and Valérie Viet Triem Tong. Reachability Analysis of Term Rewriting Systems with \sl Timbuk. In 8th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning, volume 2250 of Lectures Notes in Artificial Intelligence, pages 691--702, 2001. Springer Verlag. [WWW ] Keyword(s): Timbuk, Term Rewriting, Reachability, Tree Automata, Descendants, Verification. [Abstract] [bibtex-entry]


  6. T. Genet and F. Klay. Rewriting for Cryptographic Protocol Verification. In Proceedings 17th International Conference on Automated Deduction, volume 1831 of Lecture Notes in Artificial Intelligence, 2000. Springer-Verlag. [WWW ] Keyword(s): Cryptographic Protocol, Verification, Term Rewriting, Reachability, Approximation, Timbuk. [Abstract] [bibtex-entry]


  7. D. Le Métayer, V.-A. Nicolas, and O. Ridoux. Verification by testing for recursive program schemes. In A. Bossi, editor, LOgic-based Program Synthesis and TRansformation, 2000. Springer-Verlag, Lecture Notes in Computer Science, 1817. [bibtex-entry]


  8. T. Jensen, D. Le Métayer, and T. Thorn. Verification of control flow based security properties. In Proc. of the 20th IEEE Symp. on Security and Privacy, pages 89--103, mai 1999. New York: IEEE Computer Society. [bibtex-entry]


  9. D. Le Métayer, V.-A. Nicolas, and O. Ridoux. Verification by testing for recursive program schemes. In LOPSTR'99 (International Workshop on Logic Program Synthesis and Transformation), 1999. Springer-Verlag, LNCS. Note: To appear. [WWW ] Keyword(s): Software engineering, program verification, white-box testing, automated test data generation, program analysis, program schemes. [Abstract] [bibtex-entry]


  10. T. Jensen, D. Le Métayer, and T. Thorn. Security and Dynamic Class Loading in Java: A Formalisation. In Proceedings of the 1998 IEEE International Conference on Computer Languages, pages 4--15, May 1998. [WWW ] [Abstract] [bibtex-entry]


  11. P. Fradet and D. Le Métayer. Type checking for a multiset rewriting language. In Proc. of the LOMAPS workshop on Analysis and Verification of Multiple-agent Languages, volume 1192 of LNCS, pages 126-140, 1996. [WWW ] Keyword(s): multiset rewriting, graph grammars, type checking, invariant, verification. [Abstract] [bibtex-entry]


  12. M. Ducassé. A pragmatic survey of automated debugging. In P. Fritzson, editor, Proceedings of the First Workshop on Automated and Algorithmic Debugging, volume 749 of Lecture Notes in Computer Sciences, Linkoeping, Sweden, May 1993. Springer-Verlag. [WWW ] [Abstract] [bibtex-entry]


Internal reports
  1. David Cachera and Katell Morin-Allory. Proving Parameterized Systems: the use of a widening operator and pseudo-pipelines in polyhedral logic. Technical report TIMA-RR--05/04-01--FR, TIMA-IMAG, 2005. [Abstract] [bibtex-entry]


  2. David Cachera and Katell Morin-Allory. Verification of Control Properties in the Polyhedral Model. Technical report 1515, INRIA, 2003. [WWW ] [bibtex-entry]


  3. David Cachera and David Pichardie. Proof Tactics for the Verification of Structured Systems of Affine Recurrence Equations. Technical report 1511, INRIA, 2003. [WWW ] [bibtex-entry]


  4. G. Feuillade, T. Genet, and V. Viet Triem Tong. Reachability Analysis over Term Rewriting Systems. Technical report RR-4970, INRIA, 2003. [WWW ] Keyword(s): Term Rewriting, Reachability, Tree Automata, Approximations, Verification, Timbuk, Abstract Interpretation. [bibtex-entry]


  5. T. Genet and F. Klay. Rewriting for Cryptographic Protocol Verification (extended version). Technical Report 3921, INRIA, 2000. [WWW ] [Abstract] [bibtex-entry]


  6. T. Jensen, D. Le Métayer, and T. Thorn. Verification of control flow based security policies. Technical report 1210, IRISA, 1998. [WWW ] Keyword(s): security, verification, finite-state system, control flow, object orientation. [Abstract] [bibtex-entry]


  7. P. Fradet, R. Gaugne, and D. Le Métayer. An inference algorithm for the static verification of pointer manipulation. Technical report 980, IRISA, 1996. [WWW ] Keyword(s): Debugging tool, alias analysis, Hoare's logic.. [Abstract] [bibtex-entry]


  8. P. Fradet and D. Le Métayer. Structured Gamma. Technical report 989, IRISA, 1996. [WWW ] Keyword(s): multiset rewriting, type checking, invariant, verification, refinement. [Abstract] [bibtex-entry]


Manuals, booklets
  1. T. Genet. Timbuk 2.0 -- A Tree Automata Library -- Reference Manual and Tutorial. 2003. Note: 81 pages. \small http://www.irisa.fr/lande/genet/timbuk/. [WWW ] Keyword(s): Timbuk, Reference Manual, Tutorial, Term Rewriting, Reachability, Tree Automata, Approximations, Verification. [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Les documents contenus dans ces répertoires sont rendus disponibles par les auteurs qui y ont contribué en vue d'assurer la diffusion à temps de travaux savants et techniques sur une base non-commerciale. Les droits de copie et autres droits sont gardés par les auteurs et par les détenteurs du copyright, en dépit du fait qu'ils présentent ici leurs travaux sous forme électronique. Les personnes copiant ces informations doivent adhérer aux termes et contraintes couverts par le copyright de chaque auteur. Ces travaux ne peuvent pas être rendus disponibles ailleurs sans la permission explicite du détenteur du copyright.




Last modified: Mon Feb 26 15:35:09 2007
Author: ferre.


This document was translated from BibTEX by bibtex2html