Sciweavers

651 search results - page 102 / 131
» Precise Analysis of Java Programs Using JOANA
Sort
View
CCS
2010
ACM
15 years 2 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
PADO
2001
Springer
15 years 6 months ago
Deriving Pre-conditions for Array Bound Check Elimination
Abstract. We present a high-level approach to array bound check optimization that is neither hampered by recursive functions, nor disabled by the presence of partially redundant ch...
Wei-Ngan Chin, Siau-Cheng Khoo, Dana N. Xu
POPL
2004
ACM
16 years 2 months ago
Symbolic transfer function-based approaches to certified compilation
We present a framework for the certification of compilation and of compiled programs. Our approach uses a symbolic transfer functions-based representation of programs, so as to ch...
Xavier Rival
SQJ
2008
74views more  SQJ 2008»
15 years 2 months ago
Quantitatively measuring object-oriented couplings
Abstract. One key to several quality factors of software is the way components are connected. Software coupling can be used to estimate a number of quality factors, including maint...
Jeff Offutt, Aynur Abdurazik, Stephen R. Schach
POPL
2003
ACM
16 years 2 months ago
Selective memoization
We present a framework for applying memoization selectively. The framework provides programmer control over equality, space usage, and identification of precise dependences so tha...
Umut A. Acar, Guy E. Blelloch, Robert Harper