Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Enforcing Termination of Interprocedural Analysis Stefan Schulze Frielinghaus, Helmut Seidl, Ralf Vogler |
Enforcing Termination of Interprocedural Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated Verification of Linearization Policies Parosh Aziz Abdulla, Bengt Jonsson, Cong Quy Trinh |
Automated Verification of Linearization Policies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Alive-FP: Automated Verification of Floating Point Based Peephole Optimizations in LLVM David Menendez, Santosh Nagarakatte, Aarti Gupta |
Alive-FP: Automated Verification of Floating Point Based Peephole Optimizations in LLVM Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Loopy: Programmable and Formally Verified Loop Transformations Kedar S. Namjoshi, Nimit Singhania |
Loopy: Programmable and Formally Verified Loop Transformations Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
From Array Domains to Abstract Interpretation Under Store-Buffer-Based Memory Models Thibault Suzanne, Antoine Miné |
From Array Domains to Abstract Interpretation Under Store-Buffer-Based Memory Models Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Learning a Variable-Clustering Strategy for Octagon from Labeled Data Generated by a Static Analysis Kihong Heo, Hakjoo Oh, Hongseok Yang |
Learning a Variable-Clustering Strategy for Octagon from Labeled Data Generated by a Static Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Bounded Abstract Interpretation Maria Christakis, Valentin Wüstholz |
Bounded Abstract Interpretation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Securing a Compiler Transformation Chaoqiang Deng, Kedar S. Namjoshi |
Securing a Compiler Transformation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs Pritam M. Gharat, Uday P. Khedker, Alan Mycroft |
Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs Details |
|
Author Comments:
A journal version that supercedes this paper and adds many new concepts for soundness and scalability is under review as on Sep 2018.
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Cell Morphing: From Array Programs to Array-Free Horn Clauses David Monniaux, Laure Gonnord |
Cell Morphing: From Array Programs to Array-Free Horn Clauses Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting Tian Tan, Yue Li, Jingling Xue |
Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Simulation and Invariance for Weak Consistency Jade Alglave |
Simulation and Invariance for Weak Consistency Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Validating Numerical Semidefinite Programming Solvers for Polynomial Invariants Pierre Roux, Yuen-Lam Voronin, Sriram Sankaranarayanan |
Validating Numerical Semidefinite Programming Solvers for Polynomial Invariants Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Matthieu Journault, Antoine Miné |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Completeness in Approximate Transduction Mila Dalla Preda, Roberto Giacobazzi, Isabella Mastroeni |
Completeness in Approximate Transduction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Generalized Homogeneous Polynomials for Efficient Template-Based Nonlinear Invariant Synthesis Kensuke Kojima, Minoru Kinoshita, Kohei Suenaga |
Generalized Homogeneous Polynomials for Efficient Template-Based Nonlinear Invariant Synthesis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Julia Static Analyzer for Java Fausto Spoto |
The Julia Static Analyzer for Java Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
On the Linear Ranking Problem for Simple Floating-Point Loops Fonenantsoa Maurica, Frédéric Mesnard, Étienne Payet |
On the Linear Ranking Problem for Simple Floating-Point Loops Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Structure-Sensitive Points-To Analysis for C and C++ George Balatsouras, Yannis Smaragdakis |
Structure-Sensitive Points-To Analysis for C and C++ Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Relational Verification Through Horn Clause Transformation Emanuele De Angelis, Fabio Fioravanti, Alberto Pettorossi, Maurizio Proietti |
Relational Verification Through Horn Clause Transformation Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Krishnendu Chatterjee, Thomas A. Henzinger, Jan Otop |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Exploiting Sparsity in Difference-Bound Matrices Graeme Gange, Jorge A. Navas, Peter Schachte, Harald Søndergaard, Peter J. Stuckey |
Exploiting Sparsity in Difference-Bound Matrices Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
A Parametric Abstract Domain for Lattice-Valued Regular Expressions Jan Midtgaard, Flemming Nielson, Hanne Riis Nielson |
A Parametric Abstract Domain for Lattice-Valued Regular Expressions Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Abstract Interpretation of Supermodular Games Francesco Ranzato |
Abstract Interpretation of Supermodular Games Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|