Sciweavers

981 search results - page 59 / 197
» Symbolic pointer analysis
Sort
View
PLDI
2003
ACM
14 years 2 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
ICDAR
2011
IEEE
12 years 8 months ago
Symbol Recognition by Multiresolution Shape Context Matching
—We present a multiresolution scheme for symbol representation and recognition based on statistical shape features. We define a symbol as a set of shape points, each of which is...
Feng Su, Tong Lu, Ruoyu Yang
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 2 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
TIME
1999
IEEE
14 years 1 months ago
Symbolic Representation of User-Defined Time Granularities
In the recent literature on time representation, an effort has been made to characterize the notion of time granularity and the relationships between granularities, in order to ha...
Claudio Bettini, Roberto De Sibi
CONCUR
2009
Springer
14 years 3 months ago
Query-Based Model Checking of Ad Hoc Network Protocols
Abstract. A prominent source of complexity in the verification of ad hoc network (AHN) protocols is the fact that the number of network topologies grows exponentially with the squ...
Anu Singh, C. R. Ramakrishnan, Scott A. Smolka