Sciweavers

4716 search results - page 157 / 944
» Iterative-free program analysis
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 3 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
116
Voted
SPIN
2009
Springer
15 years 9 months ago
Symbolic Analysis via Semantic Reinterpretation
Abstract. The paper presents a novel technique to create implementations of the basic primitives used in symbolic program analysis: forward symbolic evaluation, weakest liberal pre...
Junghee Lim, Akash Lal, Thomas W. Reps
IEEEPACT
2000
IEEE
15 years 6 months ago
Region Formation Analysis with Demand-Driven Inlining for Region-Based Optimization
Region-based compilation repartitions a program into more desirable compilation units for optimization and scheduling, particularly beneficial for ILP architectures. With region-...
Tom Way, Ben Breech, Lori L. Pollock
ESOP
2011
Springer
14 years 6 months ago
Typing Local Control and State Using Flow Analysis
Programs written in scripting languages employ idioms that confound conventional type systems. In this paper, we highlight one important set of related idioms: the use of local con...
Arjun Guha, Claudiu Saftoiu, Shriram Krishnamurthi
127
Voted
HPCC
2007
Springer
15 years 6 months ago
Checkpointing Aided Parallel Execution Model and Analysis
Abstract. Checkpointing techniques are usually used to secure the execution of sequential and parallel programs. However, they can also be used in order to generate automatically a...
Laura Mereuta, Éric Renault