Sciweavers

2957 search results - page 196 / 592
» Code analysis and CS-XML
Sort
View
SAS
2007
Springer
111views Formal Methods» more  SAS 2007»
15 years 9 months ago
Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis
Abstract. Pointer information is a prerequisite for most program analyses, and inclusion-based, i.e. Andersen-style, pointer analysis is widely used to compute such information. Ho...
Ben Hardekopf, Calvin Lin
142
Voted
ISSAC
1998
Springer
117views Mathematics» more  ISSAC 1998»
15 years 7 months ago
Lightweight Formal Methods for Computer Algebra Systems
In this paper we demonstrate the use of formal methods tools to provide a semantics for the type hierarchy of the AXIOM computer algebra system, and a methodology for Aldor progra...
Martin Dunstan, Tom Kelsey, Steve Linton, Ursula M...
BSDIA
1997
Springer
15 years 7 months ago
Off-Line Signature Verification: Recent Advances and Perspectives
This paper is a description of recent advances in off-line signature verification research performed at our laboratory. Related works pertain to structural interpretation of signa...
Robert Sabourin
162
Voted
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 7 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
114
Voted
SOSP
2003
ACM
16 years 11 days ago
RacerX: effective, static detection of race conditions and deadlocks
This paper describes RacerX, a static tool that uses flowsensitive, interprocedural analysis to detect both race conditions and deadlocks. It is explicitly designed to find erro...
Dawson R. Engler, Ken Ashcraft