Sciweavers

981 search results - page 21 / 197
» Symbolic pointer analysis
Sort
View
ENTCS
2010
82views more  ENTCS 2010»
13 years 6 months ago
A Modular Static Analysis Approach to Affine Loop Invariants Detection
ional Workshop on Numerical and Symbolic Abstract Domains NSAD 2010 I.0.1I.0.1
Corinne Ancourt, Fabien Coelho, François Ir...
TACAS
2007
Springer
103views Algorithms» more  TACAS 2007»
14 years 2 months ago
A Reachability Predicate for Analyzing Low-Level Software
Reasoning about heap-allocated data structures such as linked lists and arrays is challenging. The reachability predicate has proved to be useful for reasoning about the heap in ty...
Shaunak Chatterjee, Shuvendu K. Lahiri, Shaz Qadee...
CODES
2001
IEEE
14 years 14 days ago
Empirical comparison of software-based error detection and correction techniques for embedded systems
"Function Tokens" and "NOP Fills" are two methods proposed by various authors to deal with Instruction Pointer corruption in microcontrollers, especially in th...
Royan H. L. Ong, Michael J. Pont
TACAS
2009
Springer
79views Algorithms» more  TACAS 2009»
14 years 3 months ago
Symbolic String Verification: Combining String Analysis and Size Analysis
Fang Yu, Tevfik Bultan, Oscar H. Ibarra
LCPC
2001
Springer
14 years 1 months ago
Probabilistic Points-to Analysis
Information gathered by the existing pointer analysis techniques can be classified as must aliases or definitely-points-to relationships, which hold for all executions, and may a...
Yuan-Shin Hwang, Peng-Sheng Chen, Jenq Kuen Lee, R...