๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Automated verification of pointer programs in pointer logic

โœ Scribed by Wang, Zhifang ;Chen, Yiyun ;Wang, Zhenming ;Hua, Baojian


Book ID
107475576
Publisher
Higher Education Press and Springer
Year
2008
Tongue
English
Weight
534 KB
Volume
2
Category
Article
ISSN
1673-7350

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Coding of pointers in the segregation an
โœ Denis C. Shields; Andrew Collins; Angela Marlow ๐Ÿ“‚ Article ๐Ÿ“… 1994 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 110 KB

To the Editor: We have recently encountered a minor discrepancy between the literature documenting the POINTER program and the program as it is implemented. This program allows the segregation analysis of nuclear families, conditioned upon pointers, who are relatives outside the nuclear family throu

Data dependence analysis in programs wit
โœ Wolfram Amme; Eberhard Zehendner ๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 640 KB

This paper offers an introduction to the field of data dependence analysis in programs that handle pointers and dynamically allocated structures. We are principally concerned with methods that use monotone data flow systems, and in particular present in detail a one-pass approach we recently develop

Low-cost, Concurrent Checking of Pointer
โœ HARISH PATIL; CHARLES FISCHER ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 206 KB

Illegal pointer and array accesses are a major cause of failure for C programs. We present a technique called 'guarding' to catch illegal array and pointer accesses. Our implementation of guarding for C programs works as a source-to-source translator. Auxiliary objects called guards are added to a u