Pointer analysis

Results: 174



#Item
131Effective Dynamic Detection of Alias Analysis Errors Jingyue Wu, Gang Hu, Yang Tang, Junfeng Yang Columbia University, United States {jingyue,ganghu,ty,junfeng}@cs.columbia.edu

Effective Dynamic Detection of Alias Analysis Errors Jingyue Wu, Gang Hu, Yang Tang, Junfeng Yang Columbia University, United States {jingyue,ganghu,ty,junfeng}@cs.columbia.edu

Add to Reading List

Source URL: systems.cs.columbia.edu

Language: English - Date: 2013-09-04 15:38:19
132When, Why, and How to Leverage Source Code Analysis Tools Finding critical bugs in C, C++ and Java code Gwyn Fisher  ·  CTO  ·  Klocwork Whitepaper  ·  10 October 2007

When, Why, and How to Leverage Source Code Analysis Tools Finding critical bugs in C, C++ and Java code Gwyn Fisher  ·  CTO  ·  Klocwork Whitepaper  ·  10 October 2007

Add to Reading List

Source URL: meritalk.com

Language: English - Date: 2008-06-13 11:22:12
133Modern C Jens Gustedt INRIA, F RANCE IC UBE , S TRASBOURG , F RANCE E-mail address: jens gustedt inria fr

Modern C Jens Gustedt INRIA, F RANCE IC UBE , S TRASBOURG , F RANCE E-mail address: jens gustedt inria fr

Add to Reading List

Source URL: icube-icps.unistra.fr

Language: English - Date: 2015-02-10 03:53:07
134Custom Logfile Analysis Utilities & an eBay Image Theft Detector Don Lancaster Synergetics, Box 809, Thatcher, AZ[removed]copyright c2003 as GuruGram #28 http://www.tinaja.com

Custom Logfile Analysis Utilities & an eBay Image Theft Detector Don Lancaster Synergetics, Box 809, Thatcher, AZ[removed]copyright c2003 as GuruGram #28 http://www.tinaja.com

Add to Reading List

Source URL: www.tinaja.com

Language: English
135Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: www.votetrustusa.org

Language: English - Date: 2007-12-11 09:17:41
136Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: votingsystems.cdn.sos.ca.gov

Language: English - Date: 2014-12-02 18:09:19
137Macroscopic Data Structure Analysis & Optimization Chris Lattner, Prof. Vikram Adve, UIUC Macroscopic Data Structure Optimization  DSA Algorithm Highlights

Macroscopic Data Structure Analysis & Optimization Chris Lattner, Prof. Vikram Adve, UIUC Macroscopic Data Structure Optimization DSA Algorithm Highlights

Add to Reading List

Source URL: llvm.org

Language: English - Date: 2010-02-25 20:19:41
138Forensic Analysis of the Windows Registry in Memory Brendan Dolan-Gavitt  1

Forensic Analysis of the Windows Registry in Memory Brendan Dolan-Gavitt 1

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2008-08-21 00:22:11
139Context-Sensitive Program Analysis as Database Queries Monica S. Lam John Whaley V. Benjamin Livshits Michael C. Martin Dzintars Avots

Context-Sensitive Program Analysis as Database Queries Monica S. Lam John Whaley V. Benjamin Livshits Michael C. Martin Dzintars Avots

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-06-17 02:30:13
140Static Detection of Leaks in Polymorphic Containers David L. Heine Monica S. Lam  Tensilica, Inc.

Static Detection of Leaks in Polymorphic Containers David L. Heine Monica S. Lam Tensilica, Inc.

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2007-05-02 04:02:58