Sciweavers

1687 search results - page 9 / 338
» Which pointer analysis should I use
Sort
View
ICDE
1996
IEEE
134views Database» more  ICDE 1996»
14 years 9 months ago
Parallel Pointer-Based Join Algorithms in Memory-mapped Environments
Three pointer-based parallel join algorithms are presented and analyzed for environments in which secondary storage is made transparent to the programmer through memory mapping. B...
Peter A. Buhr, Anil K. Goel, Naomi Nishimura, Prab...
FAC
2010
121views more  FAC 2010»
13 years 5 months ago
Blaming the client: on data refinement in the presence of pointers
Data refinement is a common approach to reasoning about programs, based on establishing that te program indeed satisfies all the required properties imposed by an intended abstract...
Ivana Filipovic, Peter W. O'Hearn, Noah Torp-Smith...
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
ISSTA
2012
ACM
11 years 10 months ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue
TWC
2008
147views more  TWC 2008»
13 years 7 months ago
On antijamming in general CDMA systems-part I: multiuser capacity analysis
Abstract--The capacity of a general multiuser CDMA jamming channel is analyzed when the receiver has or lacks jammer state information. Analyses are carried out for noncooperative ...
Reza Nikjah, Norman C. Beaulieu