Pointer analysis

Results: 174



#Item
131Data types / Software bugs / Primitive types / Static program analysis / Pointer / Compiler construction / Alias analysis / Aliasing / Memory safety / Software engineering / Computing / Computer programming

Effective Dynamic Detection of Alias Analysis Errors Jingyue Wu, Gang Hu, Yang Tang, Junfeng Yang Columbia University, United States {jingyue,ganghu,ty,junfeng}@cs.columbia.edu

Add to Reading List

Source URL: systems.cs.columbia.edu

Language: English - Date: 2013-09-04 15:38:19
132C++ / Cross-platform software / C programming language / Data types / Pointer / C syntax / C / Printf format string / Klocwork / Computing / Computer programming / Software engineering

When, Why, and How to Leverage Source Code Analysis Tools Finding critical bugs in C, C++ and Java code Gwyn Fisher  ·  CTO  ·  Klocwork Whitepaper  ·  10 October 2007

Add to Reading List

Source URL: meritalk.com

Language: English - Date: 2008-06-13 11:22:12
133C programming language / Data types / Cross-platform software / Type theory / Program analysis / C / Pointer / Generic programming / Aliasing / Software engineering / Computing / Computer programming

Modern C Jens Gustedt INRIA, F RANCE IC UBE , S TRASBOURG , F RANCE E-mail address: jens gustedt inria fr

Add to Reading List

Source URL: icube-icps.unistra.fr

Language: English - Date: 2015-02-10 03:53:07
134Computer programming / Primitive types / Web analytics / Webtrends / C / Array data type / Algorithms for Recovery and Isolation Exploiting Semantics / Pointer / String / Computing / Software engineering / Data types

Custom Logfile Analysis Utilities & an eBay Image Theft Detector Don Lancaster Synergetics, Box 809, Thatcher, AZ[removed]copyright c2003 as GuruGram #28 http://www.tinaja.com

Add to Reading List

Source URL: www.tinaja.com

Language: English
135Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: www.votetrustusa.org

Language: English - Date: 2007-12-11 09:17:41
136Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: votingsystems.cdn.sos.ca.gov

Language: English - Date: 2014-12-02 18:09:19
137Computer programming / C dynamic memory allocation / Pointer / Sizeof / C / Allocator / Region-based memory management / Garbage collection / Computing / Memory management / Software engineering

Macroscopic Data Structure Analysis & Optimization Chris Lattner, Prof. Vikram Adve, UIUC Macroscopic Data Structure Optimization DSA Algorithm Highlights

Add to Reading List

Source URL: llvm.org

Language: English - Date: 2010-02-25 20:19:41
138Windows Registry / Databases / Database management systems / Database theory / Primitive types / Database index / Extensible Storage Engine / Pointer / Lookup table / Computing / Data management / Information technology management

Forensic Analysis of the Windows Registry in Memory Brendan Dolan-Gavitt 1

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2008-08-21 00:22:11
139Query languages / Static program analysis / Data types / Computer languages / Type theory / Datalog / Binary decision diagram / Monica S. Lam / Pointer / Computing / Software engineering / Programming language theory

Context-Sensitive Program Analysis as Database Queries Monica S. Lam John Whaley V. Benjamin Livshits Michael C. Martin Dzintars Avots

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-06-17 02:30:13
140Data types / Software bugs / Primitive types / Memory management / Abstract data types / Pointer / Region-based memory management / Stack / Shape analysis / Software engineering / Computing / Computer programming

Static Detection of Leaks in Polymorphic Containers David L. Heine Monica S. Lam Tensilica, Inc.

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2007-05-02 04:02:58
UPDATE