Search dblp for Publications

export results for "toc:db/journals/scp/scp217.bht:"

 download as .bib file

@article{DBLP:journals/scp/CastagnaLLN22,
  author       = {Giuseppe Castagna and
                  Victor Lanvin and
                  Micka{\"{e}}l Laurent and
                  Kim Nguyen},
  title        = {Revisiting occurrence typing},
  journal      = {Sci. Comput. Program.},
  volume       = {217},
  pages        = {102781},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.scico.2022.102781},
  doi          = {10.1016/J.SCICO.2022.102781},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/CastagnaLLN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/CeresaJ22,
  author       = {Mart{\'{\i}}n Ceresa and
                  Mauro Jaskelioff},
  title        = {Effectful improvement theory},
  journal      = {Sci. Comput. Program.},
  volume       = {217},
  pages        = {102792},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.scico.2022.102792},
  doi          = {10.1016/J.SCICO.2022.102792},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/CeresaJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/CoughlinS22,
  author       = {Nicholas Coughlin and
                  Graeme Smith},
  title        = {Compositional noninterference on hardware weak memory models},
  journal      = {Sci. Comput. Program.},
  volume       = {217},
  pages        = {102779},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.scico.2022.102779},
  doi          = {10.1016/J.SCICO.2022.102779},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/CoughlinS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/HuangSFYYZ22,
  author       = {Zijie Huang and
                  Zhiqing Shao and
                  Guisheng Fan and
                  Huiqun Yu and
                  Kang Yang and
                  Ziyi Zhou},
  title        = {HBSniff: {A} static analysis tool for Java Hibernate object-relational
                  mapping code smell detection},
  journal      = {Sci. Comput. Program.},
  volume       = {217},
  pages        = {102778},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.scico.2022.102778},
  doi          = {10.1016/J.SCICO.2022.102778},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/HuangSFYYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/XuW22,
  author       = {Shenglin Xu and
                  Yongjun Wang},
  title        = {Defending against Return-Oriented Programming attacks based on return
                  instruction using static analysis and binary patch techniques},
  journal      = {Sci. Comput. Program.},
  volume       = {217},
  pages        = {102768},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.scico.2022.102768},
  doi          = {10.1016/J.SCICO.2022.102768},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/XuW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics