Sciweavers

1911 search results - page 80 / 383
» Program analysis for code duplication in logic programs
Sort
View
GECCO
1999
Springer
148views Optimization» more  GECCO 1999»
15 years 6 months ago
An Analysis of Automatic Subroutine Discovery in Genetic Programming
This paper analyses Rosca's ARL as a general framework for automatic subroutine discovery. We review and compare a number of heuristics for code selection, and experimentally...
Antonello Dessi, Antonella Giani, Antonina Starita
HOTOS
2007
IEEE
15 years 5 months ago
Beyond Bug-Finding: Sound Program Analysis for Linux
It is time for us to focus on sound analyses for our critical systems software--that is, we must focus on analyses that ensure the absence of defects of particular known types, ra...
Zachary R. Anderson, Eric A. Brewer, Jeremy Condit...
CADE
2008
Springer
16 years 2 months ago
Exploring Model-Based Development for the Verification of Real-Time Java Code
Many safety- and security-critical systems are real-time systems and, as a result, tools and techniques for verifying real-time systems are extremely important. Simulation and test...
Niusha Hakimipour, Paul A. Strooper, Roger Duke
ICFP
2002
ACM
16 years 1 months ago
An expressive, scalable type theory for certified code
We present the type theory LTT, intended to form a basis for typed target languages, providing an internal notion of logical proposition and proof. The inclusion of explicit proof...
Karl Crary, Joseph Vanderwaart
INFSOF
2002
78views more  INFSOF 2002»
15 years 1 months ago
Flow insensitive points-to sets
Pointer analysis is an important part of source code analysis. Many programs that manipulate source code take points-to sets as part of their input. Points-to related data collect...
Paul Anderson, David Binkley, Genevieve Rosay, Tim...