BACK TO INDEX

Internal reports

2007

  1. F. Besson, T. Jensen, D. Pichardie, and T. Turpin. Result certification for relational program analysis. Research Report 6333, Inria, September 2007. [WWW] [bibtex-entry]


  2. Frédéric Besson, Thomas Jensen, and Tiphaine Turpin. Computing stack maps with interfaces. Technical report 1879, Irisa, 2007. [WWW] [bibtex-entry]


  3. David Cachera, Thomas Jensen, and Pascal Sotin. Long-Run Cost Analysis by Approximation of Linear Operators over Dioids. Research Report 6338, INRIA, 10 2007. [WWW] [bibtex-entry]


  4. G. Le Guernic. Automaton-based Non-interference Monitoring of Concurrent Programs. Technical report 2007-1, Kansas State University, 234 Nichols Hall, Manhattan, KS 66506, USA, February 2007. [WWW] [Abstract] [bibtex-entry]


  5. G. Le Guernic. Dynamic Noninterference Analysis Using Context Sensitive Static Analyses. Technical report 2007-5, Kansas State University, 234 Nichols Hall, Manhattan, KS 66506, USA, July 2007. [WWW] [PDF] [Abstract] [bibtex-entry]


2006

  1. G. Le Guernic, A. Banerjee, and D. Schmidt. Automaton-based Non-interference Monitoring. Technical report 2006-1, Department of Computing and Information Sciences, College of Engineering, Kansas State University, 234 Nichols Hall, Manhattan, KS 66506, USA, April 2006. [Abstract] [bibtex-entry]


  2. G. Le Guernic, A. Banerjee, and D. Schmidt. Automaton-based Non-interference Monitoring. Technical report 2006-1, Department of Computing and Information Sciences, College of Engineering, Kansas State University, 234 Nichols Hall, Manhattan, KS 66506, USA, April 2006. [WWW] [Abstract] [bibtex-entry]


2005

  1. F. Besson, T. Jensen, and D. Pichardie. A PCC Architecture based on Certified Abstract Interpretation. Research Report RR-5751, INRIA, November 2005. Note: Also Publication Interne IRISA PI-1764. [PDF] [bibtex-entry]


  2. David Cachera and Katell Morin-Allory. Proving Parameterized Systems: the use of a widening operator and pseudo-pipelines in polyhedral logic. Technical report TIMA-RR--05/04-01--FR, TIMA-IMAG, 2005. [Abstract] [bibtex-entry]


  3. T. Denmat, M. Ducassé, and O. Ridoux. Data Mining and Cross-checking of Execution Traces. A re-interpretation of Jones, Harrold and Stasko test information visualization (Long version). Research Report RR-5661, INRIA, August 2005. Note: Also Publication Interne IRISA PI-1743. [WWW] [bibtex-entry]


2003

  1. David Cachera and Katell Morin-Allory. Verification of Control Properties in the Polyhedral Model. Technical report 1515, INRIA, 2003. [WWW] [bibtex-entry]


  2. David Cachera and David Pichardie. Proof Tactics for the Verification of Structured Systems of Affine Recurrence Equations. Technical report 1511, INRIA, 2003. [WWW] [bibtex-entry]


  3. G. Feuillade, T. Genet, and V. Viet Triem Tong. Reachability Analysis over Term Rewriting Systems. Technical report RR-4970, INRIA, 2003. [WWW] Keyword(s): Term Rewriting, Reachability, Tree Automata, Approximations, Verification, Timbuk, Abstract Interpretation. [Abstract] [bibtex-entry]


2002

  1. T. Genet and V. Viet Triem Tong. Proving Negative Conjectures on Equational Theories using Induction and Abstract Interpretation. Technical report RR-4576, INRIA, 2002. [WWW] Keyword(s): Equational theories, proof by induction, abstract interpretation, rewriting. [Abstract] [bibtex-entry]


2001

  1. Thomas Genet and Valérie Viet Triem Tong. Reachability Analysis of Term Rewriting Systems with Timbuk (extended version). Technical Report RR-4266, INRIA, 2001. [WWW] [Abstract] [bibtex-entry]


2000

  1. T. Genet and F. Klay. Rewriting for Cryptographic Protocol Verification (extended version). Technical Report 3921, INRIA, 2000. [WWW] [Abstract] [bibtex-entry]


1998

  1. T. Jensen, D. Le Métayer, and T. Thorn. Verification of control flow based security policies. Technical report 1210, IRISA, 1998. [WWW] Keyword(s): security, verification, finite-state system, control flow, object orientation. [Abstract] [bibtex-entry]



BACK TO INDEX

This document was translated from BibTEX by bibtex2html