Search dblp for Publications

export results for "toc:db/conf/sigada/hilt2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sigada/BeltCHR12,
  author       = {Jason Belt and
                  Patrice Chalin and
                  John Hatcliff and
                  Robby},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Leading-edge Ada verification technologies: highly automated Ada contract
                  checking using bakar kiasan},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {3--4},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402679},
  doi          = {10.1145/2402676.2402679},
  timestamp    = {Fri, 25 Mar 2022 14:21:18 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/BeltCHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/BeringerBPT12,
  author       = {Lennart Beringer and
                  Randall Brukardt and
                  Thomas Plum and
                  S. Tucker Taft},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Panel on compiler certification: should we trust our compiler?},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {103--104},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402708},
  doi          = {10.1145/2402676.2402708},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/BeringerBPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Bosch12,
  author       = {Geert Bosch},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Synchronization cannot be implemented as a library},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {73--80},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402702},
  doi          = {10.1145/2402676.2402702},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Bosch12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/EilersK12,
  author       = {Dan Eilers and
                  Tero Koskinen},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Adapting {ACATS} for use with run-time checks suppressed},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {97--102},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402707},
  doi          = {10.1145/2402676.2402707},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/EilersK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Fisher12,
  author       = {Kathleen Fisher},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {{HACMS:} high assurance cyber military systems},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {51--52},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402695},
  doi          = {10.1145/2402676.2402695},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Fisher12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/HardinSWP12,
  author       = {David S. Hardin and
                  Konrad Slind and
                  Michael W. Whalen and
                  Tuan{-}Hung Pham},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {A {DSL} for cross-domain security},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402697},
  doi          = {10.1145/2402676.2402697},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/HardinSWP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Kanig12,
  author       = {Johannes Kanig},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Leading-edge ada verification technologies: combining testing and
                  verification with GNATTest and GNATProve - the hi-lite project},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {5--6},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402680},
  doi          = {10.1145/2402676.2402680},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Kanig12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/KanigSD12,
  author       = {Johannes Kanig and
                  Edmond Schonberg and
                  Claire Dross},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Hi-Lite: the convergence of compiler technology and program verification},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {27--34},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402690},
  doi          = {10.1145/2402676.2402690},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/KanigSD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Kirtchev12,
  author       = {Hristian Hristov Kirtchev},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {A new robust and efficient implementation of controlled types in the
                  {GNAT} compiler},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402693},
  doi          = {10.1145/2402676.2402693},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Kirtchev12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Leino12,
  author       = {K. Rustan M. Leino},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Developing verified programs with Dafny},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {9--10},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402682},
  doi          = {10.1145/2402676.2402682},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Leino12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Leino12a,
  author       = {K. Rustan M. Leino},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Program proving using intermediate verification languages (IVLs) like
                  boogie and why3},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {25--26},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402689},
  doi          = {10.1145/2402676.2402689},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Leino12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/LevesonFT12,
  author       = {Nancy G. Leveson and
                  Cody Harrison Fleming and
                  John Thomas},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Safety of embedded software},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {7--8},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402681},
  doi          = {10.1145/2402676.2402681},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/LevesonFT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/LiSRM12,
  author       = {Shuai Li and
                  Frank Singhoff and
                  St{\'{e}}phane Rubini and
                  Michel Bourdell{\`{e}}s},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Applicability of real-time schedulability analysis on a software radio
                  protocol},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {81--94},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402703},
  doi          = {10.1145/2402676.2402703},
  timestamp    = {Thu, 15 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/LiSRM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Liskov12,
  author       = {Barbara Liskov},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Keynote presentation: Programming the turing machine},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {23--24},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402687},
  doi          = {10.1145/2402676.2402687},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Liskov12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Nilsen12,
  author       = {Kelvin Nilsen},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Tutorial overview: understanding dynamic memory management in safety
                  critical java},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402685},
  doi          = {10.1145/2402676.2402685},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Nilsen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Nilsen12a,
  author       = {Kelvin Nilsen},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Real-time Java in modernization of the aegis weapon system},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {63--70},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402699},
  doi          = {10.1145/2402676.2402699},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Nilsen12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/OLearyS12,
  author       = {Jeffrey O'Leary and
                  Alok Srivastava},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {FAA's controller pilot automatic data communication (data comm) system
                  software development},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {71--72},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402700},
  doi          = {10.1145/2402676.2402700},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/OLearyS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Sanden12,
  author       = {Bo Ingvar Sand{\'{e}}n},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Hilt'12 tutorial overview / design of multitask software: the entity-life
                  modeling approach},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402678},
  doi          = {10.1145/2402676.2402678},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Sanden12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/SchonbergP12,
  author       = {Edmond Schonberg and
                  Vincent Pucci},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Implementation of a simple dimensionality checking system in Ada 2012},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {35--42},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402692},
  doi          = {10.1145/2402676.2402692},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/SchonbergP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Steele12,
  author       = {Guy L. Steele Jr.},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Programming language life cycles},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {95--96},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402705},
  doi          = {10.1145/2402676.2402705},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Steele12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/SwardB12,
  author       = {Ricky E. Sward and
                  Jeff Boleng},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Service-oriented architecture {(SOA)} concepts and implementations},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {11--12},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402683},
  doi          = {10.1145/2402676.2402683},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/SwardB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/Taft12,
  author       = {S. Tucker Taft},
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Tutorial: multicore programming using divide-and-conquer and work
                  stealing},
  booktitle    = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  pages        = {13--14},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676.2402684},
  doi          = {10.1145/2402676.2402684},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/Taft12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigada/2012,
  editor       = {Ben Brosgol and
                  Jeff Boleng and
                  S. Tucker Taft},
  title        = {Proceedings of the 2012 {ACM} Conference on High Integrity Language
                  Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts,
                  {USA}},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2402676},
  doi          = {10.1145/2402676},
  isbn         = {978-1-4503-1505-0},
  timestamp    = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigada/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics