To see the other types of publications on this topic, follow the link: Pointer Analysi.

Journal articles on the topic 'Pointer Analysi'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Pointer Analysi.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shields, Denis C., Andrew Collins, and Angela Marlow. "Coding of pointers in the segregation analysis program POINTER." Genetic Epidemiology 11, no. 4 (1994): 385–87. http://dx.doi.org/10.1002/gepi.1370110408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Jinmeng, Ziyue Pan, Wenbo Shen, Xingkai Wang, Kangjie Lu, and Zhiyun Qian. "Type-Alias Analysis: Enabling LLVM IR with Accurate Types." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 2203–26. https://doi.org/10.1145/3728974.

Full text
Abstract:
LLVM Intermediate Representation (IR) underpins the LLVM compiler infrastructure, offering a strong type system and a static single-assignment (SSA) form that are well-suited for program analysis. However, its single-type design assigns exactly one type to each IR variable, even when the variable may legitimately correspond to multiple types. The recent introduction of opaque pointers exacerbates this limitation: all pointers in the IR are uniformly represented with a generic pointer type (ptr) that erases concrete pointee type information, making many type-based analyses ineffective. To addre
APA, Harvard, Vancouver, ISO, and other styles
3

Zou, Changwei, Dongjie He, Yulei Sui, and Jingling Xue. "TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers." Proceedings of the ACM on Software Engineering 1, FSE (2024): 1609–31. http://dx.doi.org/10.1145/3660779.

Full text
Abstract:
C++ is crucial in software development, providing low-level memory control for performance and supporting object-oriented programming to construct modular, reusable code structures. Consequently, tackling pointer analysis for C++ becomes challenging, given the need to address these two fundamental features. A relatively unexplored research area involves the handling of C++ member function pointers. Previous efforts have tended to either disregard this feature or adopt a conservative approach, resulting in unsound or imprecise results. C++ member function pointers, handling both virtual (via vi
APA, Harvard, Vancouver, ISO, and other styles
4

Matsumoto, Aki, D. S. Han, and Takao Tsuda. "Alias analysis of pointers in Pascal and Fortran 90: dependence analysis between pointer references." Acta Informatica 33, no. 2 (1996): 99–130. http://dx.doi.org/10.1007/s002360050037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smaragdakis, Yannis, and George Balatsouras. "Pointer Analysis." Foundations and Trends® in Programming Languages 2, no. 1 (2015): 1–69. http://dx.doi.org/10.1561/2500000014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smaragdakis, Yannis, and George Balatsouras. "Pointer Analysis." Foundations and Trends® in Programming Languages 2, no. 1 (2015): 1–69. https://doi.org/10.1561/2500000014.

Full text
Abstract:
Pointer analysis is a fundamental static program analysis, with a rich literature and wide applications. The goal of pointer analysis is to compute an approximation of the set of program objects that a pointer variable or expression can refer to. We present an introduction and survey of pointer analysis techniques, with an emphasis on distilling the essence of common analysis algorithms. To this end, we focus on a declarative presentation of a common core of pointer analyses: algorithms are modeled as configurable, yet easy-to-follow, logical specifications. The specifications serve as a
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Shao-Chung, Lin-Ya Yu, Li-An Her, Yuan-Shin Hwang, and Jenq-Kuen Lee. "Pointer-Based Divergence Analysis for OpenCL 2.0 Programs." ACM Transactions on Parallel Computing 8, no. 4 (2021): 1–23. http://dx.doi.org/10.1145/3470644.

Full text
Abstract:
A modern GPU is designed with many large thread groups to achieve a high throughput and performance. Within these groups, the threads are grouped into fixed-size SIMD batches in which the same instruction is applied to vectors of data in a lockstep. This GPU architecture is suitable for applications with a high degree of data parallelism, but its performance degrades seriously when divergence occurs. Many optimizations for divergence have been proposed, and they vary with the divergence information about variables and branches. A previous analysis scheme viewed pointers and return values from
APA, Harvard, Vancouver, ISO, and other styles
8

Hirzel, Martin, Daniel Von Dincklage, Amer Diwan, and Michael Hind. "Fast online pointer analysis." ACM Transactions on Programming Languages and Systems 29, no. 2 (2007): 11. http://dx.doi.org/10.1145/1216374.1216379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Jianwen, and Silvian Calman. "Symbolic pointer analysis revisited." ACM SIGPLAN Notices 39, no. 6 (2004): 145–57. http://dx.doi.org/10.1145/996893.996860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Peng-Sheng Chen, Yuan-Shin Hwang, R. D. C. Ju, and J. K. Lee. "Interprocedural probabilistic pointer analysis." IEEE Transactions on Parallel and Distributed Systems 15, no. 10 (2004): 893–907. http://dx.doi.org/10.1109/tpds.2004.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Spoto, Fausto. "Precise null-pointer analysis." Software & Systems Modeling 10, no. 2 (2009): 219–52. http://dx.doi.org/10.1007/s10270-009-0132-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Heintze, Nevin, and Olivier Tardieu. "Demand-driven pointer analysis." ACM SIGPLAN Notices 36, no. 5 (2001): 24–34. http://dx.doi.org/10.1145/381694.378802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hind, Michael, Michael Burke, Paul Carini, and Jong-Deok Choi. "Interprocedural pointer alias analysis." ACM Transactions on Programming Languages and Systems 21, no. 4 (1999): 848–94. http://dx.doi.org/10.1145/325478.325519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Petri, Aspasia, and Efthymios Karabetsos. "Extreme output power emitted by commercial laser pointers in Greece: A solely local or a global issue?" Journal of Laser Applications 34, no. 2 (2022): 022025. http://dx.doi.org/10.2351/7.0000664.

Full text
Abstract:
Although several countries have enacted legislation that prohibits the commercial distribution of laser pointers, high-power laser pointers are abundantly available on the market. The Greek Atomic Energy Commission (EEAE) investigated the compliance of laser pointers with the laser radiation safety limits in order to apply risk management actions in Greece. Compliance was assessed based on the laser pointer labeled data and in-house optical measurements. Laser pointers were purchased randomly from domestic physical marketplaces. Output power measurements revealed the risk of overexposure compa
APA, Harvard, Vancouver, ISO, and other styles
15

Thiessen, Rei, and Ondřej Lhoták. "Context transformations for pointer analysis." ACM SIGPLAN Notices 52, no. 6 (2017): 263–77. http://dx.doi.org/10.1145/3140587.3062359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Rugina, Radu, and Martin Rinard. "Pointer analysis for multithreaded programs." ACM SIGPLAN Notices 34, no. 5 (1999): 77–90. http://dx.doi.org/10.1145/301631.301645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jianwen Zhu and S. Calman. "Context sensitive symbolic pointer analysis." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 24, no. 4 (2005): 516–31. http://dx.doi.org/10.1109/tcad.2005.844092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Horwitz, S., P. Pfeiffer, and T. Reps. "Dependence analysis for pointer variables." ACM SIGPLAN Notices 24, no. 7 (1989): 28–40. http://dx.doi.org/10.1145/74818.74821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Brauer, Jörg, Ralf Huuck, and Bastian Schlich. "Interprocedural Pointer Analysis in Goanna." Electronic Notes in Theoretical Computer Science 254 (October 2009): 65–83. http://dx.doi.org/10.1016/j.entcs.2009.09.060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Vivien, Frédéric, and Martin Rinard. "Incrementalized pointer and escape analysis." ACM SIGPLAN Notices 36, no. 5 (2001): 35–46. http://dx.doi.org/10.1145/381694.378804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Machiry, Aravind, John Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, and Michael Hicks. "C to checked C by 3c." Proceedings of the ACM on Programming Languages 6, OOPSLA1 (2022): 1–29. http://dx.doi.org/10.1145/3527322.

Full text
Abstract:
Owing to the continued use of C (and C++), spatial safety violations (e.g., buffer overflows) still constitute one of today's most dangerous and prevalent security vulnerabilities. To combat these violations, Checked C extends C with bounds-enforced checked pointer types. Checked C is essentially a gradually typed spatially safe C - checked pointers are backwards-binary compatible with legacy pointers, and the language allows them to be added piecemeal, rather than necessarily all at once, so that safety retrofitting can be incremental. This paper presents a semi-automated process for porting
APA, Harvard, Vancouver, ISO, and other styles
22

Hind, Michael, and Anthony Pioli. "Which pointer analysis should I use?" ACM SIGSOFT Software Engineering Notes 25, no. 5 (2000): 113–23. http://dx.doi.org/10.1145/347636.348916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hardekopf, Ben, and Calvin Lin. "Semi-sparse flow-sensitive pointer analysis." ACM SIGPLAN Notices 44, no. 1 (2009): 226–38. http://dx.doi.org/10.1145/1594834.1480911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rugina, Radu, and Martin C. Rinard. "Pointer analysis for structured parallel programs." ACM Transactions on Programming Languages and Systems 25, no. 1 (2003): 70–116. http://dx.doi.org/10.1145/596980.596982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Bozhen, Jeff Huang, and Lawrence Rauchwerger. "Rethinking Incremental and Parallel Pointer Analysis." ACM Transactions on Programming Languages and Systems 41, no. 1 (2019): 1–31. http://dx.doi.org/10.1145/3293606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Liang, Yufei, Teng Zhang, Ganlin Li, et al. "Pointer Analysis for Database-Backed Applications." Proceedings of the ACM on Programming Languages 9, PLDI (2025): 1417–41. https://doi.org/10.1145/3729307.

Full text
Abstract:
Database-backed applications form the backbone of modern software, yet their complexity poses significant challenges for static analysis. These applications involve intricate interactions among application code, diverse database frameworks such as JDBC, Hibernate, and Spring Data JPA, and languages like Java and SQL. In this paper, we introduce DBridge, the first pointer analysis specifically designed for Java database-backed applications, capable of statically constructing comprehensive Java-to-database value flows. DBridge unifies application code analysis, database access specification mode
APA, Harvard, Vancouver, ISO, and other styles
27

ÇEZİKTÜRK, Özlem. "CONTENT ANALYSIS OF STUDENTS' CONSTRUCTIONS OF EIGHT POINTED, TEN POINTED, AND TWELVE POINTED STARS." Journal of Academic Social Sciences 75, no. 75 (2018): 244–54. http://dx.doi.org/10.16992/asos.13978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Abdulhadi, Zayid, and Walter Hengartner. "One Pointed Univalent Logharmonic Mappings." Journal of Mathematical Analysis and Applications 203, no. 2 (1996): 333–51. http://dx.doi.org/10.1006/jmaa.1996.0383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

El Abbadi, Nidhal. "New Algorithm for Text in Text Steganography." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 26, 2021): 99–112. http://dx.doi.org/10.55562/jrucs.v23i2.483.

Full text
Abstract:
Steganography is a technique to hide secret information in some other data (we call it a cover) without leaving any apparent evidence of data alteration. All of the traditional steganographic techniques have limited information- hiding capacity. They can hide only 10% (or less) of the data amounts of the cover. While much of the recent research in steganography has been on hiding data in images, many of the solutions that for images are more complicated when applied to natural language text as a cover medium. Many approaches to steganalysis attempt to detect statistical anomalies in cover data
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Yue, Tian Tan, Anders Møller, and Yannis Smaragdakis. "Precision-guided context sensitivity for pointer analysis." Proceedings of the ACM on Programming Languages 2, OOPSLA (2018): 1–29. http://dx.doi.org/10.1145/3276511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, Sean, Barbara G. Ryder, and William A. Landi. "Experiments with combined analysis for pointer aliasing." ACM SIGPLAN Notices 33, no. 7 (1998): 11–18. http://dx.doi.org/10.1145/277633.277635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Pearce, David J., Paul H. J. Kelly, and Chris Hankin. "Efficient field-sensitive pointer analysis of C." ACM Transactions on Programming Languages and Systems 30, no. 1 (2007): 4. http://dx.doi.org/10.1145/1290520.1290524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Salcianu, Alexandru, and Martin Rinard. "Pointer and escape analysis for multithreaded programs." ACM SIGPLAN Notices 36, no. 7 (2001): 12–23. http://dx.doi.org/10.1145/568014.379553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Guyer, Samuel Z., and Calvin Lin. "Error checking with client-driven pointer analysis." Science of Computer Programming 58, no. 1-2 (2005): 83–114. http://dx.doi.org/10.1016/j.scico.2005.02.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Scholz, Berhard, Johann Blieberger, and Thomas Fahringer. "Symbolic pointer analysis for detecting memory leaks." ACM SIGPLAN Notices 34, no. 11 (1999): 104–13. http://dx.doi.org/10.1145/328691.328704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Das, Manuvir. "Unification-based pointer analysis with directional assignments." ACM SIGPLAN Notices 35, no. 5 (2000): 35–46. http://dx.doi.org/10.1145/358438.349309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Cheng, Ben-Chung, and Wen-Mei W. Hwu. "Modular interprocedural pointer analysis using access paths." ACM SIGPLAN Notices 35, no. 5 (2000): 57–69. http://dx.doi.org/10.1145/358438.349311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Da Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGOPS Operating Systems Review 40, no. 5 (2006): 416–25. http://dx.doi.org/10.1145/1168917.1168908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Da Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGPLAN Notices 41, no. 11 (2006): 416–25. http://dx.doi.org/10.1145/1168918.1168908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Da Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGARCH Computer Architecture News 34, no. 5 (2006): 416–25. http://dx.doi.org/10.1145/1168919.1168908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ma, Wenjie, Shengyuan Yang, Tian Tan, Xiaoxing Ma, Chang Xu, and Yue Li. "Context Sensitivity without Contexts: A Cut-Shortcut Approach to Fast and Precise Pointer Analysis." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 539–64. http://dx.doi.org/10.1145/3591242.

Full text
Abstract:
Over the past decades, context sensitivity has been considered as one of the most effective ideas for improving the precision of pointer analysis for Java. Different from the extremely fast context-insensitivity approach, context sensitivity requires every program method to be analyzed under different contexts for separating the static abstractions of different dynamic instantiations of the method’s variables and heap objects, and thus reducing spurious object flows introduced by method calls. However, despite great precision benefits, as each method is equivalently cloned and analyzed under e
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Xia, Ming Lei, Hu Wei Liu, Yin Cao, and Xiao Hong Gao. "Risk Analysis of Quality and Safety for Laser Pointer with Remote Control." Advanced Materials Research 968 (June 2014): 263–66. http://dx.doi.org/10.4028/www.scientific.net/amr.968.263.

Full text
Abstract:
Multimedia teaching and lecturing have been widely used nowadays, and then the technology of laser pointer with remote control appears in order to satisfy the requirements. The radiation power of some laser pointers is large, which may be lead to impaired eyes due to improper use. The hazard of laser radiation was analyzed. The standards, laws and regulations of the domestic and foreign were compared. Some suggestions and measures of perfecting the relative standards, strengthening consumers' education and industry rectification were provided.
APA, Harvard, Vancouver, ISO, and other styles
43

Lyde, Steven, William E. Byrd, and Matthew Might. "Control-flow analysis of dynamic languages via pointer analysis." ACM SIGPLAN Notices 51, no. 2 (2016): 54–62. http://dx.doi.org/10.1145/2936313.2816712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ellyana, Rossy Lydia, and I. Wayan Angga Wijaya Kusuma. "Penentuan Indeks Bias Kaca Berdasarkan Pola Interferensi Cahaya Laser Terhambur Menggunakan Cermin Datar “Berdebu”." Jurnal Teori dan Aplikasi Fisika 7, no. 2 (2019): 169–78. http://dx.doi.org/10.23960/jtaf.v7i2.2150.

Full text
Abstract:
Experiment on Interference Pattern of Laser Light Scattered Analysis using a "Dusty" Plane Mirror aims to determine the glass refractive index value. The dust samples used in this experiment are baby powder, chalk, rice flour, wood powder and beauty powder. The dust samples sprinkled over a clean mirror, so it will produce an interference pattern that can be seen on the screen. The results of the interference pattern are circular because the screen is perforated with a diameter of 0.01 m. Dust particle sample variation only affects the brightness level of interference patterns. Analysis of int
APA, Harvard, Vancouver, ISO, and other styles
45

Chase, David, Mark Wegman, and F. Ken Zadeck. "Analysis of pointers and structures." ACM SIGPLAN Notices 39, no. 4 (2004): 343–59. http://dx.doi.org/10.1145/989393.989429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Chase, David R., Mark Wegman, and F. Kenneth Zadeck. "Analysis of pointers and structures." ACM SIGPLAN Notices 25, no. 6 (1990): 296–310. http://dx.doi.org/10.1145/93548.93585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Yajun. "Ruled surfaces generated by Risley prism pointers: I. Pointing accuracy evaluation and enhancement based on a structural analysis of the scan field inside the pointer." Journal of the Optical Society of America A 38, no. 12 (2021): 1884. http://dx.doi.org/10.1364/josaa.435621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Junjie Wang, Xiaohong Li, Bobo Yan, and Zhiyong Feng. "Pointer Analysis Based Vulnerability Detection for Browser Extension." International Journal of Digital Content Technology and its Applications 6, no. 1 (2012): 488–95. http://dx.doi.org/10.4156/jdcta.vol6.issue1.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Whaley, John, and Martin Rinard. "Compositional pointer and escape analysis for Java programs." ACM SIGPLAN Notices 34, no. 10 (1999): 187–206. http://dx.doi.org/10.1145/320385.320400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Yong, Suan Hsi, Susan Horwitz, and Thomas Reps. "Pointer analysis for programs with structures and casting." ACM SIGPLAN Notices 34, no. 5 (1999): 91–103. http://dx.doi.org/10.1145/301631.301647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!