Sciweavers

1452 search results - page 115 / 291
» Algorithmic Analysis of Array-Accessing Programs
Sort
View
142
Voted
CAV
2008
Springer
152views Hardware» more  CAV 2008»
15 years 4 months ago
Heap Assumptions on Demand
Termination of a heap-manipulating program generally depends on preconditions that express heap assumptions (i.e., assertions describing reachability, aliasing, separation and shar...
Andreas Podelski, Andrey Rybalchenko, Thomas Wies
110
Voted
SIGSOFT
2005
ACM
16 years 2 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken
144
Voted
JMLR
2012
13 years 4 months ago
Sparse Additive Machine
We develop a high dimensional nonparametric classification method named sparse additive machine (SAM), which can be viewed as a functional version of support vector machine (SVM)...
Tuo Zhao, Han Liu
148
Voted
SAS
2010
Springer
143views Formal Methods» more  SAS 2010»
15 years 17 days ago
Points-to Analysis as a System of Linear Equations
The efficiency of a points-to analysis is critical for several compiler optimizations and transformations, and has attracted considerable research attention. Despite several advanc...
Rupesh Nasre, Ramaswamy Govindarajan
122
Voted
OOPSLA
2010
Springer
15 years 18 days ago
Parallel inclusion-based points-to analysis
Inclusion-based points-to analysis provides a good trade-off between precision of results and speed of analysis, and it has been incorporated into several production compilers inc...
Mario Méndez-Lojo, Augustine Mathew, Keshav...