Sciweavers

1687 search results - page 22 / 338
» Which pointer analysis should I use
Sort
View
CAV
2008
Springer
160views Hardware» more  CAV 2008»
13 years 9 months ago
Scalable Shape Analysis for Systems Code
Pointer safety faults in device drivers are one of the leading causes of crashes in operating systems code. In principle, shape analysis tools can be used to prove the absence of t...
Hongseok Yang, Oukseh Lee, Josh Berdine, Cristiano...
JUCS
2006
108views more  JUCS 2006»
13 years 7 months ago
Development of Ambient Intelligence Applications using Components and Aspects
: In recent times, interest in Ambient Intelligence (or AmI) has increased considerably. One of the main challenges in the development of these systems is to improve their modulari...
Lidia Fuentes, Daniel Jiménez, Mónic...
SCAM
2008
IEEE
14 years 2 months ago
Automatic Determination of May/Must Set Usage in Data-Flow Analysis
Data-flow analysis is a common technique to gather program information for use in transformations such as register allocation, dead-code elimination, common subexpression elimina...
Andrew Stone, Michelle Strout, Shweta Behere
CAV
2012
Springer
334views Hardware» more  CAV 2012»
11 years 10 months ago
Joogie: Infeasible Code Detection for Java
We present Joogie, a tool that detects infeasible code in Java programs. Infeasible code is code that does not occur on feasible controlflow paths and thus has no feasible executi...
Stephan Arlt, Martin Schäf
VLDB
2005
ACM
185views Database» more  VLDB 2005»
14 years 8 months ago
Storing and querying XML data using denormalized relational databases
XML database systems emerge as a result of the acceptance of the XML data model. Recent works have followed the promising approach of building XML database management systems on un...
Andrey Balmin, Yannis Papakonstantinou