Filters








4,343 Hits in 6.7 sec

Increasing the Accuracy of Shape and Safety Analysis of Pointer-Based Codes [chapter]

Pedro C. Diniz
2004 Lecture Notes in Computer Science  
Analyses and transformations of programs that manipulate pointer-based data structures rely on understanding the topological relationships between the nodes ı.e., the overall shape of the data structures  ...  We believe that future static shape and safety analysis algorithms will have to include some if not all of these techniques to attain a high level accuracy.  ...  Example We now illustrate how a compiler can use the techniques presented in this paper to increase the accuracy of shape analysis and safety information for codes that manipulate sophisticated pointer-based  ... 
doi:10.1007/978-3-540-24644-2_31 fatcat:aav6cvd2xzeonhvqtdvisqvyai

Evaluation of static analysis tools used to assess software important to nuclear power plant safety

Alain Ourghanlian
2015 Nuclear Engineering and Technology  
To enhance the credibility of safety assessments and to optimize safety justification costs, Electricit e de France (EDF) investigates the use of methods and tools for source code semantic analysis, to  ...  Interpretation Software V&V Source Code Semantic Analysis a b s t r a c t We describe a comparative analysis of different tools used to assess safety-critical software used in nuclear power plants.  ...  We can already note the following: The global variables (which are visible in every line of code) systematically increase the dimensions of the geometrical shapes, and increase the tool's analysis time  ... 
doi:10.1016/j.net.2014.12.009 fatcat:z5x4lrjyq5f3pgjnn345aq5nme

A probabilistic pointer analysis for speculative optimizations

Jeff Da Silva, J. Gregory Steffan
2006 Proceedings of the 12th international conference on Architectural support for programming languages and operating systems - ASPLOS-XII  
Pointer analysis is a critical compiler analysis used to disambiguate the indirect memory references that result from the use of pointers and pointer-based data structures.  ...  Many compiler optimizations rely on accurate pointer analysis, and to ensure correctness cannot optimize in the maybe case.  ...  Pointer Analysis Accuracy The accuracy of a conventional pointer analysis algorithm is typically measured and compared by computing the average cardinality of the target location sets that can be dereferenced  ... 
doi:10.1145/1168857.1168908 dblp:conf/asplos/SilvaS06 fatcat:cohhfsmjfna5jhjmub524jypve

A probabilistic pointer analysis for speculative optimizations

Jeff Da Silva, J. Gregory Steffan
2006 SIGARCH Computer Architecture News  
Pointer analysis is a critical compiler analysis used to disambiguate the indirect memory references that result from the use of pointers and pointer-based data structures.  ...  Many compiler optimizations rely on accurate pointer analysis, and to ensure correctness cannot optimize in the maybe case.  ...  Pointer Analysis Accuracy The accuracy of a conventional pointer analysis algorithm is typically measured and compared by computing the average cardinality of the target location sets that can be dereferenced  ... 
doi:10.1145/1168919.1168908 fatcat:iw46qhcuujf4pnfr27kywksgne

A probabilistic pointer analysis for speculative optimizations

Jeff Da Silva, J. Gregory Steffan
2006 SIGPLAN notices  
Pointer analysis is a critical compiler analysis used to disambiguate the indirect memory references that result from the use of pointers and pointer-based data structures.  ...  Many compiler optimizations rely on accurate pointer analysis, and to ensure correctness cannot optimize in the maybe case.  ...  Pointer Analysis Accuracy The accuracy of a conventional pointer analysis algorithm is typically measured and compared by computing the average cardinality of the target location sets that can be dereferenced  ... 
doi:10.1145/1168918.1168908 fatcat:6uf3s6adtvdjxc6od3f6zwdggy

A probabilistic pointer analysis for speculative optimizations

Jeff Da Silva, J. Gregory Steffan
2006 ACM SIGOPS Operating Systems Review  
Pointer analysis is a critical compiler analysis used to disambiguate the indirect memory references that result from the use of pointers and pointer-based data structures.  ...  Many compiler optimizations rely on accurate pointer analysis, and to ensure correctness cannot optimize in the maybe case.  ...  Pointer Analysis Accuracy The accuracy of a conventional pointer analysis algorithm is typically measured and compared by computing the average cardinality of the target location sets that can be dereferenced  ... 
doi:10.1145/1168917.1168908 fatcat:jvi37qdrvfbpvpa6jipbg5s2k4

Static verification for memory safety of Linux kernel drivers

A. A. Vasilyev
2019 Proceedings of the Institute for System Programming of RAS  
We implemented the predicate extension for SMG to improve accuracy of the analysis.  ...  We verified of Linux kernel 4.11.6 and 4.16.10 with help of the Klever verification framework with CPAchecker as a verification engine.  ...  A probable solution to get an evidence of Linux driver verification The Linux kernel represents an industrial code base with more than 10 million lines of drivers' code.  ... 
doi:10.15514/ispras-2016-30(6)-8 doaj:fa6ae6986abf4e148b038f374d370ad6 fatcat:zx4kvkyaqzao3a7ygn6rt3af74

Static verification for memory safety of Linux kernel drivers
Статическая верификация безопасности доступа к памяти в модулях ядра ОС Linux

A.A. Vasilyev
2018 Proceedings of the Institute for System Programming of RAS  
We implemented the predicate extension for SMG to improve accuracy of the analysis.  ...  Manual analysis of warnings produced by Klever revealed 78 real bugs in drivers. We have made patches to fix 33 of them. A.A. Vasilyev. Static verification for memory safety of Linux kernel drivers.  ...  Linux driver verification The Linux kernel represents an industrial code base with more than 10 million lines of drivers' code. A distinctive feature of Linux is instability of internal interfaces.  ... 
doi:10.15514/ispras-2018-30(6)-8 fatcat:vhhh3cymjbdy7jjoglco4o6agu

Pointer Analysis (Dagstuhl Seminar 13162)

Ondrej Lhotak, Yannis Smaragdakis, Manu Sridharan, Marc Herbstritt
2013 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 13162 "Pointer Analysis".  ...  The seminar had 27 attendees, including both pointer analysis experts and researchers developing clients in need of better pointer analysis.  ...  Proven to be of cubic complexity in MOP-accuracy and of bi-quadratic complexity in MOVP-accuracy, the algorithm is efficient enough to allow the analysis of programs of a quarter of a million lines of  ... 
doi:10.4230/dagrep.3.4.91 dblp:journals/dagstuhl-reports/LhotakSS13 fatcat:no7xgil6kzgyfnwqfe773wlnza

SPREE: Object Prefetching for Mobile Computers [chapter]

Kristian Kvilekval, Ambuj Singh
2004 Lecture Notes in Computer Science  
We present a new prefetching technique for databases in mobile environments based on program analysis.  ...  In order to support database applications, mobile platforms are required to cache portions of the available data which can speed access over slow communication channels and mitigate communication disruptions  ...  The contribution of this paper include the introduction and analysis of a new prefetching technique for mobile computers based on shape analysis.  ... 
doi:10.1007/978-3-540-30469-2_33 fatcat:zt6ittebe5ffvejew4b5ui6jlm

REAL-TIME ACQUISITION AND ANALYSIS METHOD AND SYSTEM OF SECURITY HIDDEN DANGER INFORMATION IN INTELLIGENT SCENIC SPOTS UNDER THE ENVIRONMENT OF INTERNET OF THINGS

B. S. Li, Y. H. Xie
2020 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
collected data and the spatial analysis request to the GIS spatial analysis server through the Web server in real time, so as to realize the buffer analysis considering the gradient; based on the knowledge  ...  By comparing and analyzing the historical information of Location Safety Knowledge Base, the temporal and spatial variation rules of newly added hidden danger features are discovered to determine the optimal  ...  Construction of Location Security Knowledge Base Location Safety Knowledge Base S44 uses SDE engine of spatial database and relational database to store queries, including index pointer section S441, basic  ... 
doi:10.5194/isprs-archives-xlii-3-w10-437-2020 fatcat:guota2biwjbpvotrp4vgkris44

SensiCut: Material-Aware Laser Cutting Using Speckle Sensing and Deep Learning

Mustafa Doga Dogan, Steven Vidal Acevedo Colon, Varnika Sinha, Kaan Akşit, Stefanie Mueller
2021 The 34th Annual ACM Symposium on User Interface Software and Technology  
(b) SensiCut's user interface integrates material identification into the laser cutting workflow and also offers suggestions on how to adjust a design's geometry based on the identified material (e.g.,  ...  adjusting the size of an earring cut from felt since the kerf for felt is larger than for other materials).  ...  This work was supported by the NSF Award 1716413, the MIT Portugal Initiative, and the MIT Mechanical Engineering MathWorks Seed Fund Program.  ... 
doi:10.1145/3472749.3474733 fatcat:ran76nw34zhobdflhoko5ibr2u

Flow insensitive C++ pointers and polymorphism analysis and its application to slicing

Paolo Tonella, Giuliano Antoniol, Roberto Fiutem, Ettore Merlo
1997 Proceedings of the 19th international conference on Software engineering - ICSE '97  
The importance of efficiently handling pointers and polymorphism is also stressed, as a prerequisite in a code analysis framework for the C++ language.  ...  Data dependences determination, Let us consider a variable x whose points-to set is: points-to(x) = Cs, t), The based on PTA results, is safe, as a consequence of the safety of t,he point's-to and reaching  ... 
doi:10.1145/253228.253371 dblp:conf/icse/TonellaAFM97 fatcat:cboihulquncmzcjm4mpe4jdzly

Laser warning system as an element of optoelectronic battlefield surveillance

Marek Zygmunt, Krzysztof Kopczynski, Piotr Kaniewski, Jan Matuszewski
2020 Radioelectronic Systems Conference 2019  
DOB1-6/1/PS/2014 entitled "Laser Systems of Directed Energy Weapons, Laser Systems of Non-lethal Weapons" as part of the strategic program "New weapon systems and defence in the field of directed energy  ...  The research was financed by the National Center for Research and Development -contract No.  ...  The laser beam illuminating the rocket is coded in cross-section area, hence the signal analysis system introduces corrections to the rocket's flight path, bringing the rocket to the centre of the laser  ... 
doi:10.1117/12.2565139 fatcat:732rkvhd4vcdbdnxbv6zy6iqlm

Heap Abstractions for Static Analysis

Vini Kanvar, Uday P. Khedker
2016 ACM Computing Surveys  
We classify the models as storeless, store based, and hybrid.  ...  This approach allows us to compare the insights of a large number of seemingly dissimilar heap abstractions and also paves way for creating new abstractions by mix-and-match of models and summarization  ...  Acknowledgements An invigorating discussion in the Dagstuhl Seminar on Pointer Analysis [49] sowed the seeds of this survey paper.  ... 
doi:10.1145/2931098 fatcat:ocqh47fovraqtbjd35yrts6svi
« Previous Showing results 1 — 15 out of 4,343 results