Sciweavers

1801 search results - page 4 / 361
» Pointing without a pointer
Sort
View
DSN
2008
IEEE
14 years 7 days ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
PLDI
1999
ACM
13 years 10 months ago
Pointer Analysis for Multithreaded Programs
This paper presents a novel interprocedural, ow-sensitive, and context-sensitive pointer analysis algorithm for multithreaded programs that may concurrently update shared pointers...
Radu Rugina, Martin C. Rinard
CC
2012
Springer
271views System Software» more  CC 2012»
12 years 1 months ago
Parallel Replication-Based Points-To Analysis
Pointer analysis is one of the most important static analyses during compilation. While several enhancements have been made to scale pointer analysis, the work on parallelizing the...
Sandeep Putta, Rupesh Nasre
ISWC
2003
IEEE
13 years 11 months ago
WACL: Supporting Telecommunications Using Wearable Active Camera with Laser Pointer
We propose a wearable active camera with laser pointer (WACL) as a human interface device for use in telecommunications. The WACL laser pointer is attached to the active camera-he...
Nobuchika Sakata, Takeshi Kurata, Takekazu Kato, M...
TAPSOFT
1997
Springer
13 years 10 months ago
On the Complexity of Function Pointer May-Alias Analysis
This paper considers the complexity of interprocedural function pointer may-alias analysis, i.e., determining the set of functions that a function pointer (in a language such as C...
Robert Muth, Saumya K. Debray