Sciweavers

2947 search results - page 116 / 590
» Analyzing Program Analyses
Sort
View
WCRE
2005
IEEE
15 years 10 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
SCAM
2002
IEEE
15 years 9 months ago
Precise Call Graph Construction in the Presence of Function Pointers
The use of pointers presents serious problems for software productivity tools for software understanding, restructuring, and testing. Pointers enable indirect memory accesses thro...
Ana Milanova, Atanas Rountev, Barbara G. Ryder
TAPSOFT
1995
Springer
15 years 8 months ago
Static and Dynamic Processor Allocation for Higher-Order Concurrent Languages
Starting from the process algebra for Concurrent ML we develop two program analyses that facilitate the intelligent placement of processes on processors. Both analyses are obtaine...
Hanne Riis Nielson, Flemming Nielson
EUROGP
2001
Springer
106views Optimization» more  EUROGP 2001»
15 years 9 months ago
Linear-Tree GP and Its Comparison with Other GP Structures
Abstract. In recent years different genetic programming (GP) structures have emerged. Today, the basic forms of representation for genetic programs are tree, linear and graph stru...
Wolfgang Kantschik, Wolfgang Banzhaf
259
Voted
PLDI
2009
ACM
16 years 5 months ago
A decision procedure for subset constraints over regular languages
Reasoning about string variables, in particular program inputs, is an important aspect of many program analyses and testing frameworks. Program inputs invariably arrive as strings...
Pieter Hooimeijer, Westley Weimer