BACK TO INDEX

Publications of year 2000
Books and proceedings
  1. I. Attali and T. Jensen, editors. Proceedings of the International Workshop on Java Card (Java Card 2000), Cannes, France, Septembre 2000. Inria. [bibtex-entry]


  2. M. Ducassé, editor. Proceedings of the 4th International Workshop on Automated Debugging (AADEBUG2000), Munich, August 2000. COrr. Note: Refereed proceedings to appear in the COmputer Research Repository (CORR). [WWW ] [bibtex-entry]


Thesis
  1. Pascal Fradet. Approches langages pour la conception et la mise en oeuvre de programmes. document d'habilitation à diriger des recherches, Université de Rennes 1, novembre 2000. [bibtex-entry]


  2. E. Jahier. Analyse dynamique d'exécutions : construction automatisée d'analyseurs performants et spécifications de modèles d'exécution. PhD thesis, INSA de Rennes, décembre 2000. [bibtex-entry]


  3. Michaël Périn. Spécifications graphiques multi-vues : formalisation et vérification de cohérence. PhD thesis, IFSIC, October 2000. [bibtex-entry]


Articles in journal or book chapters
  1. J.-P. Banâtre, P. Fradet, and D. Le Métayer. Gamma and the chemical reaction model: fifteen years after. In C.S. Calude, Gh. Paun, G. Rozenberg, and A. Salomaa, editors, Multiset Processing. Springer-Verlag, 2000. [bibtex-entry]


  2. M. Ducassé and J. Noyé. Tracing Prolog programs by source instrumentation is efficient enough. Elsevier Journal of Logic Programming,, 43(2):157-172, May 2000. [WWW ] Keyword(s): Debugging, tracing, source to source transformation, benchmarking, Prolog.. [Abstract] [bibtex-entry]


  3. P. Fradet and J. Mallet. Compilation of a Specialized Functional Language for Massively Parallel Computers. Journal of Functional Programming, 2000. [bibtex-entry]


Conference articles
  1. V. Abily and M. Ducassé. Benchmarking a distributed intrusion detection system based on ASAX: Preliminary results. In H. Debar, editor, RAID 2000 (Recent Advances on Intrusion Detection), 2000. Note: Refereed extended abtract. [WWW ] [bibtex-entry]


  2. Thomas Colcombet and Pascal Fradet. Enforcing Trace Properties by Program Transformation. In Conference record of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2000. [WWW ] [Abstract] [bibtex-entry]


  3. E. Denney and T. Jensen. Correctness of Java Card method lookup via logical relations. In Proc. of European Symp. on Programming (ESOP 2000), Lecture Notes in Computer Science, pages 104--118, 2000. Springer. [bibtex-entry]


  4. M. Ducassé and L. Rozé. Proof obligations of the B formal method: Local proofs ensure global consistency. In A. Bossi, editor, LOgic-based Program Synthesis and TRansformation, pages 11-30, 2000. Springer-Verlag, Lecture Notes in Computer Science, 1817. [bibtex-entry]


  5. P. Fradet, V. Issarny, and S. Rouvrais. Analyzing non-functional properties of mobile agents. In Proc. of Fundamental Approaches to Software Engineering, FASE'00, Lecture Notes in Computer Science, march 2000. Springer-Verlag. [WWW ] Keyword(s): Mobile agents, RPC, performance, security. [Abstract] [bibtex-entry]


  6. T. Genet and F. Klay. Rewriting for Cryptographic Protocol Verification. In Proceedings 17th International Conference on Automated Deduction, volume 1831 of Lecture Notes in Artificial Intelligence, 2000. Springer-Verlag. [WWW ] Keyword(s): Cryptographic Protocol, Verification, Term Rewriting, Reachability, Approximation, Timbuk. [Abstract] [bibtex-entry]


  7. E. Jahier. Collecting graphical abstract views of Mercury program executions. In M. Ducassé, editor, Proceedings of the International Workshop on Automated Debugging (AADEBUG2000), Munich, August 2000. Note: Refereed proceedings to appear in the COmputer Research Repository (CORR). [WWW ] [bibtex-entry]


  8. E. Jahier, M. Ducassé, and O. Ridoux. Specifying Prolog Trace Models with a Continuation Semantics. In K.-K. Lau, editor, Proc. of LOgic-based Program Synthesis and TRansformation, London, July 2000. Note: Technical Report Report Series, Department of Computer Science, University of Manchester, ISSN 1361-6161. Report number UMCS-00-6-1. [WWW ] [bibtex-entry]


  9. E. Jahier, M. Ducassé, and O. Ridoux. Spécification de modèles de traces de programmes Prolog à l'aide d'une sémantique par continuation. In Touraivane, editor, Actes des Journées francophones de Programmation Logique et par Contraintes, Marseille, 2000. Hermès. [bibtex-entry]


  10. D. Le Métayer, V.-A. Nicolas, and O. Ridoux. Verification by testing for recursive program schemes. In A. Bossi, editor, LOgic-based Program Synthesis and TRansformation, 2000. Springer-Verlag, Lecture Notes in Computer Science, 1817. [bibtex-entry]


  11. J.-P. Pouzol and M. Ducassé. Handling Generic Intrusion Signatures is not Trivial. In H. Debar, editor, RAID 2000 (Recent Advances on Intrusion Detection), 2000. Note: Refereed extended abtract. [WWW ] [bibtex-entry]


  12. Michaël Périn. Cohérence de spécifications multi-vues. In les actes de l'atelier Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'2000), Grenoble, France, January 2000. [bibtex-entry]


Internal reports
  1. P. Fradet and J. Mallet. Compilation of a Specialized Functional Language for Massively Parallel Computers. Technical report 3894, INRIA, march 2000. [WWW ] Keyword(s): Skeletons, polytopes, data parallelism, cost analysis, program transformation. [Abstract] [bibtex-entry]


  2. T. Genet and F. Klay. Rewriting for Cryptographic Protocol Verification (extended version). Technical Report 3921, INRIA, 2000. [WWW ] [Abstract] [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Les documents contenus dans ces répertoires sont rendus disponibles par les auteurs qui y ont contribué en vue d'assurer la diffusion à temps de travaux savants et techniques sur une base non-commerciale. Les droits de copie et autres droits sont gardés par les auteurs et par les détenteurs du copyright, en dépit du fait qu'ils présentent ici leurs travaux sous forme électronique. Les personnes copiant ces informations doivent adhérer aux termes et contraintes couverts par le copyright de chaque auteur. Ces travaux ne peuvent pas être rendus disponibles ailleurs sans la permission explicite du détenteur du copyright.




Last modified: Mon Feb 26 15:35:06 2007
Author: ferre.


This document was translated from BibTEX by bibtex2html