Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Typestate analysis

Typestate analysis, sometimes called protocol analysis, is a form of program analysis employed in programming languages. It is most commonly applied… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Properties in the actor model can be described in terms of the message-passing behavior of actors. In this paper, we address the… Expand
Is this relevant?
2015
2015
We study the problem of extending RV techniques in the context of (asynchronous) actor systems, so as to be able to carry out a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
2013
2013
Behavioral models are useful for various software engineering tasks. They are, however, often missing in practice. Thus… Expand
  • figure 3
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2010
2010
A typestate property describes which operations are available on an object or a group of inter-related objects, depending on this… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
  • E. Bodden
  • ACM/IEEE 32nd International Conference on…
  • 2010
  • Corpus ID: 8327934
Typestate analysis determines whether a program violates a set of finite-state properties. Because the typestate-analysis problem… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Session types allow communication protocols to be specified type-theoretically so that protocol implementations can be verified… Expand
  • figure 6
  • figure 7
  • figure 8
  • figure 12
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Objects model the world, and state is fundamental to a faithful modeling. Engineers use state machines to understand and reason… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Objects often define usage protocols that clients must follow inorder for these objects to work properly. Aliasing makes… Expand
  • figure 1
  • figure 2
  • figure 6
  • figure 9
  • figure 12
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present an analysis to verify abstract set specifications for programs that use object field values to determine the… Expand
  • figure 2
  • table 1
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Today’s mainstream object-oriented compilers and tools do not support declaring and statically checking simple pre- and… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 7
Is this relevant?