Pointer analysis

Results: 174



#Item
31Windows Agnostic Memory Analysis.dvi

Windows Agnostic Memory Analysis.dvi

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2010-07-28 09:42:48
32SoftSig: Software-Exposed Hardware Signatures for Code Analysis and Optimization ∗ James Tuck‡ ‡  NC State University

SoftSig: Software-Exposed Hardware Signatures for Code Analysis and Optimization ∗ James Tuck‡ ‡ NC State University

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2008-02-07 12:56:23
33RC23638 (W0506-058) June 10, 2005 Computer Science IBM Research Report Fast Online Pointer Analysis Martin Hirzel, Daniel von Dincklage*, Amer Diwan*, Michael Hind

RC23638 (W0506-058) June 10, 2005 Computer Science IBM Research Report Fast Online Pointer Analysis Martin Hirzel, Daniel von Dincklage*, Amer Diwan*, Michael Hind

Add to Reading List

Source URL: www-plan.cs.colorado.edu

- Date: 2008-09-19 18:00:15
    34The C Implementation of Icon; A Tour Through Version 5* Ralph E. Griswold William H. Mitchell Stephen B. Wampler  TR 83-1 la

    The C Implementation of Icon; A Tour Through Version 5* Ralph E. Griswold William H. Mitchell Stephen B. Wampler TR 83-1 la

    Add to Reading List

    Source URL: www.cs.arizona.edu

    Language: English - Date: 2014-02-09 10:57:40
    35Verifying Dereference Safety via Expanding-Scope Analysis A. Loginov∗ E. Yahav

    Verifying Dereference Safety via Expanding-Scope Analysis A. Loginov∗ E. Yahav

    Add to Reading List

    Source URL: www.cs.technion.ac.il

    Language: English - Date: 2008-05-21 10:34:30
    36Effective Typestate Verification in the Presence of Aliasing STEPHEN J. FINK and ERAN YAHAV IBM T. J. Watson Research Center and NURIT DOR1

    Effective Typestate Verification in the Presence of Aliasing STEPHEN J. FINK and ERAN YAHAV IBM T. J. Watson Research Center and NURIT DOR1

    Add to Reading List

    Source URL: www.cs.technion.ac.il

    Language: English - Date: 2010-01-27 15:57:10
    37Runtime Instrumentation for Precise Flow-Sensitive Type Analysis

    Runtime Instrumentation for Precise Flow-Sensitive Type Analysis

    Add to Reading List

    Source URL: lara.epfl.ch

    Language: English - Date: 2010-08-17 17:02:57
    38Data Flow Analysis for Software Prefetching Linked Data Structures in Java Brendon Cahoon and Kathryn S. McKinley Department of Computer Science University of Massachusetts Amherst, MA 01002

    Data Flow Analysis for Software Prefetching Linked Data Structures in Java Brendon Cahoon and Kathryn S. McKinley Department of Computer Science University of Massachusetts Amherst, MA 01002

    Add to Reading List

    Source URL: research.ac.upc.edu

    Language: English - Date: 2002-03-20 08:48:07
    39SSVInterprocedural Pointer Analysis in Goanna J¨org Brauerb,2 Ralf Huucka Bastian Schlichb,2 a National ICT Australia Ltd. (NICTA) Locked Bag 6016, University of New South Wales

    SSVInterprocedural Pointer Analysis in Goanna J¨org Brauerb,2 Ralf Huucka Bastian Schlichb,2 a National ICT Australia Ltd. (NICTA) Locked Bag 6016, University of New South Wales

    Add to Reading List

    Source URL: www.cse.unsw.edu.au

    Language: English - Date: 2011-08-18 01:13:28
    40Microsoft Word - KL-1_RussianCircularSlideRule.rtf

    Microsoft Word - KL-1_RussianCircularSlideRule.rtf

    Add to Reading List

    Source URL: sliderulemuseum.com

    Language: English