Control flow graph

Results: 74



#Item
1LNCSSound Control-Flow Graph Extraction for Java Programs with Exceptions

LNCSSound Control-Flow Graph Extraction for Java Programs with Exceptions

Add to Reading List

Source URL: www.nada.kth.se

- Date: 2012-09-26 08:09:45
    2A Theory for Control-Flow Graph Exploration Stephan Arlt1 , Philipp R¨ ummer2 , and Martin Sch¨ af1 1

    A Theory for Control-Flow Graph Exploration Stephan Arlt1 , Philipp R¨ ummer2 , and Martin Sch¨ af1 1

    Add to Reading List

    Source URL: www.csl.sri.com

    - Date: 2015-06-10 17:08:51
      3Control-Flow Analysis Last time – Undergraduate compilers in a day Today – Control-flow analysis – Building basic blocks

      Control-Flow Analysis Last time – Undergraduate compilers in a day Today – Control-flow analysis – Building basic blocks

      Add to Reading List

      Source URL: www.cis.upenn.edu

      Language: English - Date: 2006-09-14 09:54:15
      4Database-Backed Program Analysis for Scalable Error Propagation Cathrin Weiss Cindy Rubio-González

      Database-Backed Program Analysis for Scalable Error Propagation Cathrin Weiss Cindy Rubio-González

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2015-02-16 13:00:00
      5Distributed ADMM for Model Predictive Control and Congestion Control João F. C. Mota1,2 , João M. F. Xavier2 , Pedro M. Q. Aguiar2 , and Markus Püschel3 Abstract— Many problems in control can be modeled as an optimi

      Distributed ADMM for Model Predictive Control and Congestion Control João F. C. Mota1,2 , João M. F. Xavier2 , Pedro M. Q. Aguiar2 , and Markus Püschel3 Abstract— Many problems in control can be modeled as an optimi

      Add to Reading List

      Source URL: users.isr.ist.utl.pt

      Language: English - Date: 2012-09-06 05:05:42
      6Distributed ADMM for Model Predictive Control and Congestion Control João F. C. Mota1,2 , João M. F. Xavier2 , Pedro M. Q. Aguiar2 , and Markus Püschel3 Abstract— Many problems in control can be modeled as an optimi

      Distributed ADMM for Model Predictive Control and Congestion Control João F. C. Mota1,2 , João M. F. Xavier2 , Pedro M. Q. Aguiar2 , and Markus Püschel3 Abstract— Many problems in control can be modeled as an optimi

      Add to Reading List

      Source URL: www.ee.ucl.ac.uk

      Language: English - Date: 2013-07-05 07:45:59
      7Automatically Computing Program Path Complexity Lucas Bang, Abdulbaki Aydin, and Tevfik Bultan I. I NTRODUCTION Recent automated software testing techniques focus on achieving path coverage. We present a program complexi

      Automatically Computing Program Path Complexity Lucas Bang, Abdulbaki Aydin, and Tevfik Bultan I. I NTRODUCTION Recent automated software testing techniques focus on achieving path coverage. We present a program complexi

      Add to Reading List

      Source URL: gswc.cs.ucsb.edu

      Language: English - Date: 2016-03-01 02:43:37
      8Specialization of Imperative Programs through Analysis of Relational Expressions Alexander Sakharov Motorola 1501 W. Shure Drive Arlington Heights, IL 60004, USA

      Specialization of Imperative Programs through Analysis of Relational Expressions Alexander Sakharov Motorola 1501 W. Shure Drive Arlington Heights, IL 60004, USA

      Add to Reading List

      Source URL: repository.readscheme.org

      Language: English - Date: 2010-10-22 08:04:37
      9Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

      Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

      Add to Reading List

      Source URL: users.ece.cmu.edu

      Language: English - Date: 2014-05-29 15:38:01
      10HI-CFG: Construction by Binary Analysis, and Application to Attack Polymorphism Dan Caselden1 , Alex Bazhanyuk2 , Mathias Payer3 , Stephen McCamant4 , and Dawn Song3 1

      HI-CFG: Construction by Binary Analysis, and Application to Attack Polymorphism Dan Caselden1 , Alex Bazhanyuk2 , Mathias Payer3 , Stephen McCamant4 , and Dawn Song3 1

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40