BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
fragment (11)
logic (9)
transit (8)
use (8)
decis (6)

Stem guard$ (all stems)

73 papers:

PODSPODS-2015-AlvianoP
Default Negation for Non-Guarded Existential Rules (MA, AP), pp. 79–90.
PODSPODS-2015-CalauttiGP #termination
Chase Termination for Guarded Existential Rules (MC, GG, AP), pp. 91–103.
SIGMODSIGMOD-2015-MozafariGY #database #design #framework #named #robust
CliffGuard: A Principled Framework for Finding Robust Database Designs (BM, EZYG, DYY), pp. 1167–1182.
FoSSaCSFoSSaCS-2015-CloustonBGB #induction #programming #reasoning #recursion
Programming and Reasoning with Guarded Recursion for Coinductive Types (RC, AB, HBG, LB), pp. 407–421.
SASSAS-2015-CattaruzzaASK #analysis #bound
Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
ICFPICFP-2015-KarachaliasSVJ #data type #lazy evaluation #pattern matching
GADTs meet their match: pattern-matching warnings that account for GADTs, guards, and laziness (GK, TS, DV, SLPJ), pp. 424–436.
ASPLOSASPLOS-2015-YetimMM #communication #execution #fault #named #parallel
CommGuard: Mitigating Communication Errors in Error-Prone Parallel Execution (YY, SM, MM), pp. 311–323.
SOSPSOSP-2015-Hoffmann #approximate #energy #named
JouleGuard: energy guarantees for approximate applications (HH), pp. 198–214.
CAVCAV-2015-Saha0M #learning #named
Alchemist: Learning Guarded Affine Functions (SS, PG, PM), pp. 440–446.
CAVCAV-2015-Leslie-HurdCF #verification
Verifying Linearizability of Intel® Software Guard Extensions (RLH, DC, MF), pp. 144–160.
LICSLICS-2015-BenediktCCB #bound #complexity #logic
The Complexity of Boundedness for Guarded Logics (MB, BtC, TC, MVB), pp. 293–304.
DACDAC-2014-ZhangKIBWH #configuration management #named #reliability
GUARD: GUAranteed Reliability in Dynamically Reconfigurable Systems (HZ, MAK, MEI, LB, HJW, JH), p. 6.
PODSPODS-2014-GottlobRS
Expressiveness of guarded existential rule languages (GG, SR, MS), pp. 27–38.
KRKR-2014-GottlobHKL #logic #semantics
Stable Model Semantics for Guarded Existential Rules and Description Logics (GG, AH, CK, TL).
CAVCAV-2014-DilligDC #memory management #safety #synthesis
Optimal Guard Synthesis for Memory Safety (TD, ID, SC), pp. 491–507.
LICSLICS-CSL-2014-BenediktCB #effectiveness #logic
Effective interpolation and preservation in guarded logics (MB, BtC, MVB), p. 10.
LICSLICS-CSL-2014-Mogelberg #effectiveness #recursion #type system
A type theory for productive coprogramming via guarded recursion (REM), p. 10.
RTARTA-TLCA-2014-BizjakBM #nondeterminism #type system
A Model of Countable Nondeterminism in Guarded Type Theory (AB, LB, MM), pp. 108–123.
TACASTACAS-2013-BackesGHMS #android #named #requirements
AppGuard — Enforcing User Requirements on Android Apps (MB, SG, CH, MM, PvSR), pp. 543–548.
ICALPICALP-v2-2013-GottlobPT #query #transitive
Querying the Guarded Fragment with Transitivity (GG, AP, LT), pp. 287–298.
ICFPICFP-2013-AtkeyM #effectiveness #recursion
Productive coprogramming with guarded recursion (RA, CM), pp. 197–208.
LICSLICS-2013-BirkedalM #fixpoint #recursion #type system
Intensional Type Theory with Guarded Recursive Types qua Fixed Points on Universes (LB, REM), pp. 213–222.
VLDBVLDB-2012-BaranyCO #query
Queries with Guarded Negation (VB, BtC, MO), pp. 1328–1339.
CHICHI-2012-GuyT #named #navigation #visual notation
CrossingGuard: exploring information content in navigation aids for visually impaired pedestrians (RTG, KNT), pp. 405–414.
VLDBVLDB-2011-JinLLH #data mining #detection #named #network #social #social media
SocialSpamGuard: A Data Mining-Based Spam Detection System for Social Media Networks (XJ, CXL, JL, JH), pp. 1458–1461.
ICALPICALP-v2-2011-BaranyCS
Guarded Negation (VB, BtC, LS), pp. 356–367.
HPCAHPCA-2011-MadanBBA #manycore #power management
A case for guarded power gating for multi-core processors (NM, AB, PB, MA), pp. 291–300.
CSLCSL-2011-Otto #bisimulation
The Freedoms of Guarded Bisimulation (MO), p. 2.
LICSLICS-2011-BirkedalMSS
First Steps in Synthetic Guarded Domain Theory: Step-Indexing in the Topos of Trees (LB, REM, JS, KS), pp. 55–64.
LCTESLCTES-2010-BrandtSS #concurrent #specification
Translating concurrent action oriented specifications to synchronous guarded actions (JB, KS, SKS), pp. 47–56.
LICSLICS-2010-BaranyGO #query
Querying the Guarded Fragment (VB, GG, MO), pp. 1–10.
LICSLICS-2010-Otto
Highly Acyclic Groups, Hypergraph Covers and the Guarded Fragment (MO), pp. 11–20.
ICALPICALP-v2-2009-Michaliszyn #decidability #transitive
Decidability of the Guarded Fragment with the Transitive Closure (JM), pp. 261–272.
MODELSMoDELS-2009-DrusinskyS #logic #uml #using
Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
MODELSMoDELS-2009-DrusinskyS #logic #uml #using
Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
VLDBVLDB-2008-LuM #database #named #strict
AuditGuard: a system for database auditing under retention restrictions (WL, GM), pp. 1484–1487.
TOOLSTOOLS-EUROPE-2008-CohenGM #program transformation #using
Guarded Program Transformations Using JTL (TC, JYG, IM), pp. 100–120.
WCREWCRE-2007-KomondoorR #dependence #modelling
Recovering Data Models via Guarded Dependences (RK, GR), pp. 110–119.
PLDIPLDI-2007-CheremPR #analysis #detection #memory management #using
Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
SACSAC-2007-Li #abstraction #parametricity #protocol #proving #verification
Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocols (YL), pp. 1534–1535.
SACSAC-2007-NoordendeBT #mobile #security #using
Guarding security sensitive content using confined mobile agents (Gv'N, FMTB, AST), pp. 48–55.
OSDIOSDI-2006-ErlingssonAVBN #named
XFI: Software Guards for System Address Spaces (ÚE, MA, MV, MB, GCN), pp. 75–88.
ICALPICALP-2005-Nilsson #approximate
Approximate Guarding of Monotone and Rectilinear Polygons (BJN), pp. 1362–1373.
FMFM-2005-PierikCB #using
Controlling Object Allocation Using Creation Guards (CP, DC, FSdB), pp. 59–74.
QAPLQAPL-2004-HurdMM05 #probability
Probabilistic Guarded Commands Mechanized in HOL (JH, AM, CM), pp. 95–111.
GPCEGPCE-2005-Mogensen #equation
Semi-inversion of Guarded Equations (TÆM), pp. 189–204.
CSLCSL-2005-Kieronski #equivalence #transitive
Results on the Guarded Fragment with Equivalence or Transitive Relations (EK), pp. 309–324.
ICLPICLP-2005-SneyersSD #continuation #optimisation
Guard and Continuation Optimization for Occurrence Representations of CHR (JS, TS, BD), pp. 83–97.
DACDAC-2004-RosenbandA #composition #scheduling
Modular scheduling of guarded atomic actions (DLR, A), pp. 55–60.
SEFMSEFM-2004-SistlaWZ #using
Checking Extended CTL properties Using Guarded Quotient Structures (APS, XW, MZ), pp. 87–94.
LOPSTRLOPSTR-2004-Fruhwirth #concurrent #multi
Specialization of Concurrent Guarded Multi-set Transformation Rules (TWF), pp. 133–148.
SACSAC-2004-CarvalhoCSBF #mobile #network #security #using
Using mobile agents as roaming security guards to test and improve security of hosts and networks (MMC, TBC, NS, MRB, KMF), pp. 87–93.
IJCARIJCAR-2004-KazakovN #transitive
A Resolution Decision Procedure for the Guarded Fragment with Transitive Guards (YK, HdN), pp. 122–136.
FoSSaCSFoSSaCS-2003-Kieronski #transitive
The Two-Variable Guarded Fragment with Transitive Guards Is 2EXPTIME-Hard (EK), pp. 299–312.
TACASTACAS-2003-BehrmannBFL #analysis #automaton #verification
Static Guard Analysis in Timed Automata Verification (GB, PB, EF, KGL), pp. 254–277.
POPLPOPL-2003-XiCC #data type #recursion
Guarded recursive datatype constructors (HX, CC, GC), pp. 224–235.
LICSLICS-2003-EmersonK #model checking #protocol
Model Checking Guarded Protocols (EAE, VK), pp. 361–370.
ECOOPECOOP-2002-ArnoldR #effectiveness
Thin Guards: A Simple and Effective Technique for Reducing the Penalty of Dynamic Class Loading (MA, BGR), pp. 498–524.
LICSLICS-2002-Otto #finite #theorem
Modal and Guarded Characterisation Theorems over Finite Transition Systems (MO), p. 371–?.
PODSPODS-2001-GottlobLS #game studies #logic
Robbers, Marshals, and Guards: Game Theoretic and Logical Characterizations of Hypertree Width (GG, NL, FS).
LICSLICS-2001-SzwastT #on the #problem #transitive
On the Decision Problem for the Guarded Fragment with Transitivity (WS, LT), pp. 147–156.
TOOLSTOOLS-USA-2000-MaleyS #question
But Who Will Guard the Guardians? (DM, ITAS), pp. 227–238.
ICLPCL-2000-Dierkes
An Application of Model Building in a Resolution Decision Procedure for Guarded Formulas (MD), pp. 583–597.
LICSLICS-2000-GradelHO #logic
Back and Forth between Guarded and Modal Logics (EG, CH, MO), pp. 217–228.
CADECADE-1999-Gradel #logic
Invited Talk: Decision procedures for guarded logics (EG), pp. 31–51.
CSLCSL-1999-SeidlN #fixpoint #on the
On Guarding Nested Fixpoints (HS, AN), pp. 484–498.
LICSLICS-1999-GanzingerMV #transitive
The Two-Variable Guarded Fragment with Transitive Relations (HG, CM, MV), pp. 24–34.
LICSLICS-1999-GanzingerN #similarity
A Superposition Decision Procedure for the Guarded Fragment with Equality (HG, HdN), pp. 295–303.
LICSLICS-1999-GradelW #fixpoint #logic
Guarded Fixed Point Logic (EG, IW), pp. 45–54.
FoSSaCSFoSSaCS-1998-AmadioC #analysis #type system
Analysis of a Guard Condition in Type Theory (Extended Abstract) (RMA, SCG), pp. 48–62.
ICFPICFP-1998-Kiselyov
LAND*: an AND with local bindings, a guarded LET* special form (OK), p. 336.
CADECADE-1998-Nivelle
A Resolution Decision Procedure for the Guarded Fragment (HdN), pp. 191–204.
ICLPJICSCP-1988-Nystrom88 #horn clause
Control Structures for Guarded Horn Clauses (SON), pp. 1351–1370.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.