Search results

From MaRDI portal
  • ML-based Python vulnerability detection tool 2024-09-11 Paper Runtime Exception Detection in Java Programs Using Symbolic Execution 2015-01-09 Paper Comparing...
    10 bytes (13 words) - 10:59, 7 October 2023
  • Publication Date of Publication Type Runtime Exception Detection in Java Programs Using Symbolic Execution 2015-01-09 Paper Designing...
    10 bytes (13 words) - 10:59, 7 October 2023
  • behaviour of classical effective field theories 2022-08-19 Paper Runtime Exception Detection in Java Programs Using Symbolic Execution 2015-01-09 Paper A scattering...
    10 bytes (13 words) - 10:59, 7 October 2023
  • semantics for nominal exceptions 2014-04-16 Paper Fresh-register automata 2014-04-10 Paper Game semantics for interface middleweight Java 2014-04-10 Paper Full...
    10 bytes (13 words) - 18:05, 11 December 2023
  • 2018-07-04 Paper Multiparty session types, beyond duality 2018-06-27 Paper Timed runtime monitoring for multiparty conversations 2017-11-29 Paper Fencing off Go:...
    10 bytes (13 words) - 09:06, 25 September 2023
  • website: http://logging.apache.org/log4j/2.x/ Cited In (3) Runtime Exception Detection in Java Programs Using Symbolic Execution jEdit ArgoUML This page...
    12 bytes (39 words) - 07:46, 13 March 2026
  • Cited In (16) Developing high quality software Winnowing Runtime Exception Detection in Java Programs Using Symbolic Execution Towards light-weight probabilistic...
    12 bytes (59 words) - 07:48, 13 March 2026
  • that?) Official website: http://www.jedit.org/ Cited In (11) Runtime Exception Detection in Java Programs Using Symbolic Execution Asynchronous proof processing...
    12 bytes (68 words) - 07:39, 13 March 2026
  • uta.edu/~csallner/jcrasher/ Cited In (30) IdentityHashMap Runtime Exception Detection in Java Programs Using Symbolic Execution Automation of broad sanity...
    12 bytes (101 words) - 07:46, 13 March 2026
  • Postconditions Runtime Exception Detection in Java Programs Using Symbolic Execution Computer Aided Verification Automatic verification of Java programs with...
    15 bytes (252 words) - 23:05, 8 February 2024
  • order trace model checking Runtime Exception Detection in Java Programs Using Symbolic Execution Collecting statistics over runtime executions Automated formal...
    15 bytes (241 words) - 15:24, 3 February 2024
  • Software CUTE DART Java PathFinder jEdit ArgoUML log4j JCrasher This page was built for publication: Runtime Exception Detection in Java Programs Using Symbolic...
    15 bytes (137 words) - 21:15, 3 February 2024
  • approach of data-flow analysis based on exception propagation analysis Publication:2763679 Runtime Exception Detection in Java Programs Using Symbolic Execution...
    15 bytes (151 words) - 14:53, 3 February 2024
  • treatment of exception handling in an expression-oriented language A deductive proof system for multithreaded Java with exceptions Java and the Java memory model...
    15 bytes (216 words) - 15:30, 3 February 2024
  • copying Safety-critical Java programs from \textsf{Circus} models Programmed deallocation without dangling reference Exception handling for copyless messaging...
    15 bytes (553 words) - 10:24, 30 January 2024
  • programs using supertype abstraction As-if-serial exception handling semantics for Java futures Featherweight Java with dynamic and static overloading Title not...
    15 bytes (565 words) - 03:16, 6 February 2024
  • deterministic processes A proof technique for parallel programs Formalising Java RMI with explicit code mobility Title not available (Why is that?) Compositional...
    15 bytes (539 words) - 17:09, 30 January 2024
  • org/10.1145/2699444 Recommendations Runtime monitoring of metric first-order temporal properties Efficient Runtime Verification of First-Order Temporal...
    15 bytes (662 words) - 18:03, 3 February 2024
  • the special issue on runtime verification Introduction to the special issue on runtime verification A survey of challenges for runtime verification from advanced...
    15 bytes (942 words) - 20:07, 2 February 2024
  • data-flow analyses for imperative languages A survey of challenges for runtime verification from advanced application domains (beyond software) Non-termination...
    15 bytes (500 words) - 10:18, 6 February 2024