Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sigada/hilt2012.bht:"
@inproceedings{DBLP:conf/sigada/BeltCHR12, author = {Jason Belt and Patrice Chalin and John Hatcliff and Robby}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Leading-edge Ada verification technologies: highly automated Ada contract checking using bakar kiasan}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {3--4}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402679}, doi = {10.1145/2402676.2402679}, timestamp = {Fri, 25 Mar 2022 14:21:18 +0100}, biburl = {https://dblp.org/rec/conf/sigada/BeltCHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/BeringerBPT12, author = {Lennart Beringer and Randall Brukardt and Thomas Plum and S. Tucker Taft}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Panel on compiler certification: should we trust our compiler?}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {103--104}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402708}, doi = {10.1145/2402676.2402708}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/BeringerBPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Bosch12, author = {Geert Bosch}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Synchronization cannot be implemented as a library}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {73--80}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402702}, doi = {10.1145/2402676.2402702}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Bosch12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/EilersK12, author = {Dan Eilers and Tero Koskinen}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Adapting {ACATS} for use with run-time checks suppressed}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {97--102}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402707}, doi = {10.1145/2402676.2402707}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/EilersK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Fisher12, author = {Kathleen Fisher}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {{HACMS:} high assurance cyber military systems}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {51--52}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402695}, doi = {10.1145/2402676.2402695}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Fisher12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/HardinSWP12, author = {David S. Hardin and Konrad Slind and Michael W. Whalen and Tuan{-}Hung Pham}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {A {DSL} for cross-domain security}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {53--62}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402697}, doi = {10.1145/2402676.2402697}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/HardinSWP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Kanig12, author = {Johannes Kanig}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Leading-edge ada verification technologies: combining testing and verification with GNATTest and GNATProve - the hi-lite project}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {5--6}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402680}, doi = {10.1145/2402676.2402680}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Kanig12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/KanigSD12, author = {Johannes Kanig and Edmond Schonberg and Claire Dross}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Hi-Lite: the convergence of compiler technology and program verification}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {27--34}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402690}, doi = {10.1145/2402676.2402690}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/KanigSD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Kirtchev12, author = {Hristian Hristov Kirtchev}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {A new robust and efficient implementation of controlled types in the {GNAT} compiler}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {43--50}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402693}, doi = {10.1145/2402676.2402693}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Kirtchev12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Leino12, author = {K. Rustan M. Leino}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Developing verified programs with Dafny}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {9--10}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402682}, doi = {10.1145/2402676.2402682}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Leino12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Leino12a, author = {K. Rustan M. Leino}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Program proving using intermediate verification languages (IVLs) like boogie and why3}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {25--26}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402689}, doi = {10.1145/2402676.2402689}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Leino12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/LevesonFT12, author = {Nancy G. Leveson and Cody Harrison Fleming and John Thomas}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Safety of embedded software}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {7--8}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402681}, doi = {10.1145/2402676.2402681}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/LevesonFT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/LiSRM12, author = {Shuai Li and Frank Singhoff and St{\'{e}}phane Rubini and Michel Bourdell{\`{e}}s}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Applicability of real-time schedulability analysis on a software radio protocol}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {81--94}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402703}, doi = {10.1145/2402676.2402703}, timestamp = {Thu, 15 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/LiSRM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Liskov12, author = {Barbara Liskov}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Keynote presentation: Programming the turing machine}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {23--24}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402687}, doi = {10.1145/2402676.2402687}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Liskov12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Nilsen12, author = {Kelvin Nilsen}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Tutorial overview: understanding dynamic memory management in safety critical java}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {15--22}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402685}, doi = {10.1145/2402676.2402685}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Nilsen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Nilsen12a, author = {Kelvin Nilsen}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Real-time Java in modernization of the aegis weapon system}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {63--70}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402699}, doi = {10.1145/2402676.2402699}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Nilsen12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/OLearyS12, author = {Jeffrey O'Leary and Alok Srivastava}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {FAA's controller pilot automatic data communication (data comm) system software development}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {71--72}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402700}, doi = {10.1145/2402676.2402700}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/OLearyS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Sanden12, author = {Bo Ingvar Sand{\'{e}}n}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Hilt'12 tutorial overview / design of multitask software: the entity-life modeling approach}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {1--2}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402678}, doi = {10.1145/2402676.2402678}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Sanden12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/SchonbergP12, author = {Edmond Schonberg and Vincent Pucci}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Implementation of a simple dimensionality checking system in Ada 2012}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {35--42}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402692}, doi = {10.1145/2402676.2402692}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/SchonbergP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Steele12, author = {Guy L. Steele Jr.}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Programming language life cycles}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {95--96}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402705}, doi = {10.1145/2402676.2402705}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Steele12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/SwardB12, author = {Ricky E. Sward and Jeff Boleng}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Service-oriented architecture {(SOA)} concepts and implementations}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {11--12}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402683}, doi = {10.1145/2402676.2402683}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/SwardB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/Taft12, author = {S. Tucker Taft}, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Tutorial: multicore programming using divide-and-conquer and work stealing}, booktitle = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, pages = {13--14}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676.2402684}, doi = {10.1145/2402676.2402684}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/Taft12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sigada/2012, editor = {Ben Brosgol and Jeff Boleng and S. Tucker Taft}, title = {Proceedings of the 2012 {ACM} Conference on High Integrity Language Technology, {HILT} '12, December 2-6, 2012, Boston, Massachusetts, {USA}}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2402676}, doi = {10.1145/2402676}, isbn = {978-1-4503-1505-0}, timestamp = {Fri, 25 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigada/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.