Pointer analysis

Results: 174



#Item
141Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams John Whaley Monica S. Lam Computer Science Department Stanford University

Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams John Whaley Monica S. Lam Computer Science Department Stanford University

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2004-04-28 04:04:03
142Documentation of the BEMCmpMgr (CEC Compliance Manager) DLL For Analysis of Commercial Buildings SAC[removed]v8) (latest changes in Red font) The purpose of this document is to provide information needed to develop so

Documentation of the BEMCmpMgr (CEC Compliance Manager) DLL For Analysis of Commercial Buildings SAC[removed]v8) (latest changes in Red font) The purpose of this document is to provide information needed to develop so

Add to Reading List

Source URL: bees.archenergy.com

Language: English - Date: 2014-05-13 19:25:53
143New URL: http://www.R-project.org/conferences/DSC[removed]DSC 2001 Proceedings of the 2nd International Workshop on Distributed Statistical Computing March 15-17, Vienna, Austria http://www.ci.tuwien.ac.at/Conferences/DSC

New URL: http://www.R-project.org/conferences/DSC[removed]DSC 2001 Proceedings of the 2nd International Workshop on Distributed Statistical Computing March 15-17, Vienna, Austria http://www.ci.tuwien.ac.at/Conferences/DSC

Add to Reading List

Source URL: www.r-project.org

Language: English - Date: 2014-02-10 03:03:38
144CIS Update:  Practice Pointers PRESENTED BY GAIL PENDLETON & CECELIA FRIEDMAN LEVIN MODERATOR: SONIA PARRAS April 22, 2013

CIS Update:  Practice Pointers PRESENTED BY GAIL PENDLETON & CECELIA FRIEDMAN LEVIN MODERATOR: SONIA PARRAS April 22, 2013

Add to Reading List

Source URL: www.asistahelp.org

Language: English - Date: 2013-04-22 13:00:01
145Analysis procedure overview The goals of analysis are: To collect various numbers for test cases and/or tool reports, e.g., numbers of true tool warnings by weakness category. To estimate tool overlap (to what degree do

Analysis procedure overview The goals of analysis are: To collect various numbers for test cases and/or tool reports, e.g., numbers of true tool warnings by weakness category. To estimate tool overlap (to what degree do

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:56:14
146BCF2 Quick Reference  In BCF2, a typed value consists of a typing byte and the actual value with type mandated by the typing byte. In the typing byte, the lowest four bits give the atomic type. If the number represented

BCF2 Quick Reference In BCF2, a typed value consists of a typing byte and the actual value with type mandated by the typing byte. In the typing byte, the lowest four bits give the atomic type. If the number represented

Add to Reading List

Source URL: www.1000genomes.org

Language: English - Date: 2012-07-05 12:17:07
147BCF2 Quick Reference (r198)  In BCF2, each key in the FILTER, INFO and FORMAT fields is required to be defined in the VCF header. For each record, a key is stored as an integer which is the index of its first appearance

BCF2 Quick Reference (r198) In BCF2, each key in the FILTER, INFO and FORMAT fields is required to be defined in the VCF header. For each record, a key is stored as an integer which is the index of its first appearance

Add to Reading List

Source URL: samtools.github.io

Language: English - Date: 2014-09-12 06:54:45
148Detailed Case Analysis of Region Inconsistencies Zhilei Xu [removed] 1

Detailed Case Analysis of Region Inconsistencies Zhilei Xu [removed] 1

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2013-09-16 03:49:12
149Systematic Analysis of Defenses Against Return-Oriented Programming ⋆ R. Skowyra, K. Casteel, H. Okhravi, N. Zeldovich, and W. Streilein Boston University, MIT Lincoln Laboratory, and MIT CSAIL  Abstract. Since the int

Systematic Analysis of Defenses Against Return-Oriented Programming ⋆ R. Skowyra, K. Casteel, H. Okhravi, N. Zeldovich, and W. Streilein Boston University, MIT Lincoln Laboratory, and MIT CSAIL Abstract. Since the int

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
150Automated vulnerability analysis of zero sized heap allocations April 2010 Julien Vanegue ([removed]) Microsoft Security Engineering Center (MSEC)

Automated vulnerability analysis of zero sized heap allocations April 2010 Julien Vanegue ([removed]) Microsoft Security Engineering Center (MSEC)

Add to Reading List

Source URL: www.hackitoergosum.org

Language: English - Date: 2010-04-23 08:06:57