A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
Increasing the Accuracy of Shape and Safety Analysis of Pointer-Based Codes
[chapter]
2004
Lecture Notes in Computer Science
Analyses and transformations of programs that manipulate pointer-based data structures rely on understanding the topological relationships between the nodes ı.e., the overall shape of the data structures ...
We believe that future static shape and safety analysis algorithms will have to include some if not all of these techniques to attain a high level accuracy. ...
Example We now illustrate how a compiler can use the techniques presented in this paper to increase the accuracy of shape analysis and safety information for codes that manipulate sophisticated pointer-based ...
doi:10.1007/978-3-540-24644-2_31
fatcat:aav6cvd2xzeonhvqtdvisqvyai
Evaluation of static analysis tools used to assess software important to nuclear power plant safety
2015
Nuclear Engineering and Technology
To enhance the credibility of safety assessments and to optimize safety justification costs, Electricit e de France (EDF) investigates the use of methods and tools for source code semantic analysis, to ...
Interpretation Software V&V Source Code Semantic Analysis a b s t r a c t We describe a comparative analysis of different tools used to assess safety-critical software used in nuclear power plants. ...
We can already note the following: The global variables (which are visible in every line of code) systematically increase the dimensions of the geometrical shapes, and increase the tool's analysis time ...
doi:10.1016/j.net.2014.12.009
fatcat:z5x4lrjyq5f3pgjnn345aq5nme
A probabilistic pointer analysis for speculative optimizations
2006
Proceedings of the 12th international conference on Architectural support for programming languages and operating systems - ASPLOS-XII
Pointer analysis is a critical compiler analysis used to disambiguate the indirect memory references that result from the use of pointers and pointer-based data structures. ...
Many compiler optimizations rely on accurate pointer analysis, and to ensure correctness cannot optimize in the maybe case. ...
Pointer Analysis Accuracy The accuracy of a conventional pointer analysis algorithm is typically measured and compared by computing the average cardinality of the target location sets that can be dereferenced ...
doi:10.1145/1168857.1168908
dblp:conf/asplos/SilvaS06
fatcat:cohhfsmjfna5jhjmub524jypve
A probabilistic pointer analysis for speculative optimizations
2006
SIGARCH Computer Architecture News
Pointer analysis is a critical compiler analysis used to disambiguate the indirect memory references that result from the use of pointers and pointer-based data structures. ...
Many compiler optimizations rely on accurate pointer analysis, and to ensure correctness cannot optimize in the maybe case. ...
Pointer Analysis Accuracy The accuracy of a conventional pointer analysis algorithm is typically measured and compared by computing the average cardinality of the target location sets that can be dereferenced ...
doi:10.1145/1168919.1168908
fatcat:iw46qhcuujf4pnfr27kywksgne
A probabilistic pointer analysis for speculative optimizations
2006
SIGPLAN notices
Pointer analysis is a critical compiler analysis used to disambiguate the indirect memory references that result from the use of pointers and pointer-based data structures. ...
Many compiler optimizations rely on accurate pointer analysis, and to ensure correctness cannot optimize in the maybe case. ...
Pointer Analysis Accuracy The accuracy of a conventional pointer analysis algorithm is typically measured and compared by computing the average cardinality of the target location sets that can be dereferenced ...
doi:10.1145/1168918.1168908
fatcat:6uf3s6adtvdjxc6od3f6zwdggy
A probabilistic pointer analysis for speculative optimizations
2006
ACM SIGOPS Operating Systems Review
Pointer analysis is a critical compiler analysis used to disambiguate the indirect memory references that result from the use of pointers and pointer-based data structures. ...
Many compiler optimizations rely on accurate pointer analysis, and to ensure correctness cannot optimize in the maybe case. ...
Pointer Analysis Accuracy The accuracy of a conventional pointer analysis algorithm is typically measured and compared by computing the average cardinality of the target location sets that can be dereferenced ...
doi:10.1145/1168917.1168908
fatcat:jvi37qdrvfbpvpa6jipbg5s2k4
Static verification for memory safety of Linux kernel drivers
2019
Proceedings of the Institute for System Programming of RAS
We implemented the predicate extension for SMG to improve accuracy of the analysis. ...
We verified of Linux kernel 4.11.6 and 4.16.10 with help of the Klever verification framework with CPAchecker as a verification engine. ...
A probable solution to get an evidence of
Linux driver verification The Linux kernel represents an industrial code base with more than 10 million lines of drivers' code. ...
doi:10.15514/ispras-2016-30(6)-8
doaj:fa6ae6986abf4e148b038f374d370ad6
fatcat:zx4kvkyaqzao3a7ygn6rt3af74
Static verification for memory safety of Linux kernel drivers
Статическая верификация безопасности доступа к памяти в модулях ядра ОС Linux
2018
Proceedings of the Institute for System Programming of RAS
Статическая верификация безопасности доступа к памяти в модулях ядра ОС Linux
We implemented the predicate extension for SMG to improve accuracy of the analysis. ...
Manual analysis of warnings produced by Klever revealed 78 real bugs in drivers. We have made patches to fix 33 of them. A.A. Vasilyev. Static verification for memory safety of Linux kernel drivers. ...
Linux driver verification The Linux kernel represents an industrial code base with more than 10 million lines of drivers' code. A distinctive feature of Linux is instability of internal interfaces. ...
doi:10.15514/ispras-2018-30(6)-8
fatcat:vhhh3cymjbdy7jjoglco4o6agu
Pointer Analysis (Dagstuhl Seminar 13162)
2013
Dagstuhl Reports
This report documents the program and the outcomes of Dagstuhl Seminar 13162 "Pointer Analysis". ...
The seminar had 27 attendees, including both pointer analysis experts and researchers developing clients in need of better pointer analysis. ...
Proven to be of cubic complexity in MOP-accuracy and of bi-quadratic complexity in MOVP-accuracy, the algorithm is efficient enough to allow the analysis of programs of a quarter of a million lines of ...
doi:10.4230/dagrep.3.4.91
dblp:journals/dagstuhl-reports/LhotakSS13
fatcat:no7xgil6kzgyfnwqfe773wlnza
SPREE: Object Prefetching for Mobile Computers
[chapter]
2004
Lecture Notes in Computer Science
We present a new prefetching technique for databases in mobile environments based on program analysis. ...
In order to support database applications, mobile platforms are required to cache portions of the available data which can speed access over slow communication channels and mitigate communication disruptions ...
The contribution of this paper include the introduction and analysis of a new prefetching technique for mobile computers based on shape analysis. ...
doi:10.1007/978-3-540-30469-2_33
fatcat:zt6ittebe5ffvejew4b5ui6jlm
REAL-TIME ACQUISITION AND ANALYSIS METHOD AND SYSTEM OF SECURITY HIDDEN DANGER INFORMATION IN INTELLIGENT SCENIC SPOTS UNDER THE ENVIRONMENT OF INTERNET OF THINGS
2020
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
collected data and the spatial analysis request to the GIS spatial analysis server through the Web server in real time, so as to realize the buffer analysis considering the gradient; based on the knowledge ...
By comparing and analyzing the historical information of Location Safety Knowledge Base, the temporal and spatial variation rules of newly added hidden danger features are discovered to determine the optimal ...
Construction of Location Security Knowledge Base Location Safety Knowledge Base S44 uses SDE engine of spatial database and relational database to store queries, including index pointer section S441, basic ...
doi:10.5194/isprs-archives-xlii-3-w10-437-2020
fatcat:guota2biwjbpvotrp4vgkris44
SensiCut: Material-Aware Laser Cutting Using Speckle Sensing and Deep Learning
2021
The 34th Annual ACM Symposium on User Interface Software and Technology
(b) SensiCut's user interface integrates material identification into the laser cutting workflow and also offers suggestions on how to adjust a design's geometry based on the identified material (e.g., ...
adjusting the size of an earring cut from felt since the kerf for felt is larger than for other materials). ...
This work was supported by the NSF Award 1716413, the MIT Portugal Initiative, and the MIT Mechanical Engineering MathWorks Seed Fund Program. ...
doi:10.1145/3472749.3474733
fatcat:ran76nw34zhobdflhoko5ibr2u
Flow insensitive C++ pointers and polymorphism analysis and its application to slicing
1997
Proceedings of the 19th international conference on Software engineering - ICSE '97
The importance of efficiently handling pointers and polymorphism is also stressed, as a prerequisite in a code analysis framework for the C++ language. ...
Data dependences determination, Let us consider a variable x whose points-to set is:
points-to(x) = Cs, t), The based on PTA results, is safe, as a consequence of the safety of t,he point's-to and reaching ...
doi:10.1145/253228.253371
dblp:conf/icse/TonellaAFM97
fatcat:cboihulquncmzcjm4mpe4jdzly
Laser warning system as an element of optoelectronic battlefield surveillance
2020
Radioelectronic Systems Conference 2019
DOB1-6/1/PS/2014 entitled "Laser Systems of Directed Energy Weapons, Laser Systems of Non-lethal Weapons" as part of the strategic program "New weapon systems and defence in the field of directed energy ...
The research was financed by the National Center for Research and Development -contract No. ...
The laser beam illuminating the rocket is coded in cross-section area, hence the signal analysis system introduces corrections to the rocket's flight path, bringing the rocket to the centre of the laser ...
doi:10.1117/12.2565139
fatcat:732rkvhd4vcdbdnxbv6zy6iqlm
Heap Abstractions for Static Analysis
2016
ACM Computing Surveys
We classify the models as storeless, store based, and hybrid. ...
This approach allows us to compare the insights of a large number of seemingly dissimilar heap abstractions and also paves way for creating new abstractions by mix-and-match of models and summarization ...
Acknowledgements An invigorating discussion in the Dagstuhl Seminar on Pointer Analysis [49] sowed the seeds of this survey paper. ...
doi:10.1145/2931098
fatcat:ocqh47fovraqtbjd35yrts6svi
« Previous
Showing results 1 — 15 out of 4,343 results