Sciweavers

4722 search results - page 125 / 945
» Representation-independent program analysis
Sort
View
JSS
2006
85views more  JSS 2006»
13 years 9 months ago
Effects of context on program slicing
Whether context-sensitive program analysis is more effective than context-insensitive analysis is an ongoing discussion. There is evidence that context-sensitivity matters in comp...
Jens Krinke
APLAS
2008
ACM
13 years 11 months ago
Certified Reasoning in Memory Hierarchies
Abstract. Parallel programming is rapidly gaining importance as a vector to develop high performance applications that exploit the improved capabilities of modern computer architec...
Gilles Barthe, César Kunz, Jorge Luis Sacch...
ER
2009
Springer
112views Database» more  ER 2009»
14 years 3 months ago
A Generic Set Theory-Based Pattern Matching Approach for the Analysis of Conceptual Models
Jörg Becker, Patrick Delfmann, Sebastian Herw...
ISSTA
2012
ACM
11 years 11 months ago
Residual investigation: predictive and precise bug detection
We introduce the concept of “residual investigation” for program analysis. A residual investigation is a dynamic check installed as a result of running a static analysis that ...
Kaituo Li, Christoph Reichenbach, Christoph Csalln...
KBSE
2009
IEEE
14 years 3 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan