Journal articles on the topic 'Pointer Analysi'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Pointer Analysi.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shields, Denis C., Andrew Collins, and Angela Marlow. "Coding of pointers in the segregation analysis program POINTER." Genetic Epidemiology 11, no. 4 (1994): 385–87. http://dx.doi.org/10.1002/gepi.1370110408.
Full textZhou, Jinmeng, Ziyue Pan, Wenbo Shen, Xingkai Wang, Kangjie Lu, and Zhiyun Qian. "Type-Alias Analysis: Enabling LLVM IR with Accurate Types." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 2203–26. https://doi.org/10.1145/3728974.
Full textZou, Changwei, Dongjie He, Yulei Sui, and Jingling Xue. "TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers." Proceedings of the ACM on Software Engineering 1, FSE (2024): 1609–31. http://dx.doi.org/10.1145/3660779.
Full textMatsumoto, Aki, D. S. Han, and Takao Tsuda. "Alias analysis of pointers in Pascal and Fortran 90: dependence analysis between pointer references." Acta Informatica 33, no. 2 (1996): 99–130. http://dx.doi.org/10.1007/s002360050037.
Full textSmaragdakis, Yannis, and George Balatsouras. "Pointer Analysis." Foundations and Trends® in Programming Languages 2, no. 1 (2015): 1–69. http://dx.doi.org/10.1561/2500000014.
Full textSmaragdakis, Yannis, and George Balatsouras. "Pointer Analysis." Foundations and Trends® in Programming Languages 2, no. 1 (2015): 1–69. https://doi.org/10.1561/2500000014.
Full textWang, Shao-Chung, Lin-Ya Yu, Li-An Her, Yuan-Shin Hwang, and Jenq-Kuen Lee. "Pointer-Based Divergence Analysis for OpenCL 2.0 Programs." ACM Transactions on Parallel Computing 8, no. 4 (2021): 1–23. http://dx.doi.org/10.1145/3470644.
Full textHirzel, Martin, Daniel Von Dincklage, Amer Diwan, and Michael Hind. "Fast online pointer analysis." ACM Transactions on Programming Languages and Systems 29, no. 2 (2007): 11. http://dx.doi.org/10.1145/1216374.1216379.
Full textZhu, Jianwen, and Silvian Calman. "Symbolic pointer analysis revisited." ACM SIGPLAN Notices 39, no. 6 (2004): 145–57. http://dx.doi.org/10.1145/996893.996860.
Full textPeng-Sheng Chen, Yuan-Shin Hwang, R. D. C. Ju, and J. K. Lee. "Interprocedural probabilistic pointer analysis." IEEE Transactions on Parallel and Distributed Systems 15, no. 10 (2004): 893–907. http://dx.doi.org/10.1109/tpds.2004.56.
Full textSpoto, Fausto. "Precise null-pointer analysis." Software & Systems Modeling 10, no. 2 (2009): 219–52. http://dx.doi.org/10.1007/s10270-009-0132-5.
Full textHeintze, Nevin, and Olivier Tardieu. "Demand-driven pointer analysis." ACM SIGPLAN Notices 36, no. 5 (2001): 24–34. http://dx.doi.org/10.1145/381694.378802.
Full textHind, Michael, Michael Burke, Paul Carini, and Jong-Deok Choi. "Interprocedural pointer alias analysis." ACM Transactions on Programming Languages and Systems 21, no. 4 (1999): 848–94. http://dx.doi.org/10.1145/325478.325519.
Full textPetri, Aspasia, and Efthymios Karabetsos. "Extreme output power emitted by commercial laser pointers in Greece: A solely local or a global issue?" Journal of Laser Applications 34, no. 2 (2022): 022025. http://dx.doi.org/10.2351/7.0000664.
Full textThiessen, Rei, and Ondřej Lhoták. "Context transformations for pointer analysis." ACM SIGPLAN Notices 52, no. 6 (2017): 263–77. http://dx.doi.org/10.1145/3140587.3062359.
Full textRugina, Radu, and Martin Rinard. "Pointer analysis for multithreaded programs." ACM SIGPLAN Notices 34, no. 5 (1999): 77–90. http://dx.doi.org/10.1145/301631.301645.
Full textJianwen Zhu and S. Calman. "Context sensitive symbolic pointer analysis." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 24, no. 4 (2005): 516–31. http://dx.doi.org/10.1109/tcad.2005.844092.
Full textHorwitz, S., P. Pfeiffer, and T. Reps. "Dependence analysis for pointer variables." ACM SIGPLAN Notices 24, no. 7 (1989): 28–40. http://dx.doi.org/10.1145/74818.74821.
Full textBrauer, Jörg, Ralf Huuck, and Bastian Schlich. "Interprocedural Pointer Analysis in Goanna." Electronic Notes in Theoretical Computer Science 254 (October 2009): 65–83. http://dx.doi.org/10.1016/j.entcs.2009.09.060.
Full textVivien, Frédéric, and Martin Rinard. "Incrementalized pointer and escape analysis." ACM SIGPLAN Notices 36, no. 5 (2001): 35–46. http://dx.doi.org/10.1145/381694.378804.
Full textMachiry, Aravind, John Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, and Michael Hicks. "C to checked C by 3c." Proceedings of the ACM on Programming Languages 6, OOPSLA1 (2022): 1–29. http://dx.doi.org/10.1145/3527322.
Full textHind, Michael, and Anthony Pioli. "Which pointer analysis should I use?" ACM SIGSOFT Software Engineering Notes 25, no. 5 (2000): 113–23. http://dx.doi.org/10.1145/347636.348916.
Full textHardekopf, Ben, and Calvin Lin. "Semi-sparse flow-sensitive pointer analysis." ACM SIGPLAN Notices 44, no. 1 (2009): 226–38. http://dx.doi.org/10.1145/1594834.1480911.
Full textRugina, Radu, and Martin C. Rinard. "Pointer analysis for structured parallel programs." ACM Transactions on Programming Languages and Systems 25, no. 1 (2003): 70–116. http://dx.doi.org/10.1145/596980.596982.
Full textLiu, Bozhen, Jeff Huang, and Lawrence Rauchwerger. "Rethinking Incremental and Parallel Pointer Analysis." ACM Transactions on Programming Languages and Systems 41, no. 1 (2019): 1–31. http://dx.doi.org/10.1145/3293606.
Full textLiang, Yufei, Teng Zhang, Ganlin Li, et al. "Pointer Analysis for Database-Backed Applications." Proceedings of the ACM on Programming Languages 9, PLDI (2025): 1417–41. https://doi.org/10.1145/3729307.
Full textÇEZİKTÜRK, Özlem. "CONTENT ANALYSIS OF STUDENTS' CONSTRUCTIONS OF EIGHT POINTED, TEN POINTED, AND TWELVE POINTED STARS." Journal of Academic Social Sciences 75, no. 75 (2018): 244–54. http://dx.doi.org/10.16992/asos.13978.
Full textAbdulhadi, Zayid, and Walter Hengartner. "One Pointed Univalent Logharmonic Mappings." Journal of Mathematical Analysis and Applications 203, no. 2 (1996): 333–51. http://dx.doi.org/10.1006/jmaa.1996.0383.
Full textEl Abbadi, Nidhal. "New Algorithm for Text in Text Steganography." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 26, 2021): 99–112. http://dx.doi.org/10.55562/jrucs.v23i2.483.
Full textLi, Yue, Tian Tan, Anders Møller, and Yannis Smaragdakis. "Precision-guided context sensitivity for pointer analysis." Proceedings of the ACM on Programming Languages 2, OOPSLA (2018): 1–29. http://dx.doi.org/10.1145/3276511.
Full textZhang, Sean, Barbara G. Ryder, and William A. Landi. "Experiments with combined analysis for pointer aliasing." ACM SIGPLAN Notices 33, no. 7 (1998): 11–18. http://dx.doi.org/10.1145/277633.277635.
Full textPearce, David J., Paul H. J. Kelly, and Chris Hankin. "Efficient field-sensitive pointer analysis of C." ACM Transactions on Programming Languages and Systems 30, no. 1 (2007): 4. http://dx.doi.org/10.1145/1290520.1290524.
Full textSalcianu, Alexandru, and Martin Rinard. "Pointer and escape analysis for multithreaded programs." ACM SIGPLAN Notices 36, no. 7 (2001): 12–23. http://dx.doi.org/10.1145/568014.379553.
Full textGuyer, Samuel Z., and Calvin Lin. "Error checking with client-driven pointer analysis." Science of Computer Programming 58, no. 1-2 (2005): 83–114. http://dx.doi.org/10.1016/j.scico.2005.02.005.
Full textScholz, Berhard, Johann Blieberger, and Thomas Fahringer. "Symbolic pointer analysis for detecting memory leaks." ACM SIGPLAN Notices 34, no. 11 (1999): 104–13. http://dx.doi.org/10.1145/328691.328704.
Full textDas, Manuvir. "Unification-based pointer analysis with directional assignments." ACM SIGPLAN Notices 35, no. 5 (2000): 35–46. http://dx.doi.org/10.1145/358438.349309.
Full textCheng, Ben-Chung, and Wen-Mei W. Hwu. "Modular interprocedural pointer analysis using access paths." ACM SIGPLAN Notices 35, no. 5 (2000): 57–69. http://dx.doi.org/10.1145/358438.349311.
Full textDa Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGOPS Operating Systems Review 40, no. 5 (2006): 416–25. http://dx.doi.org/10.1145/1168917.1168908.
Full textDa Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGPLAN Notices 41, no. 11 (2006): 416–25. http://dx.doi.org/10.1145/1168918.1168908.
Full textDa Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGARCH Computer Architecture News 34, no. 5 (2006): 416–25. http://dx.doi.org/10.1145/1168919.1168908.
Full textMa, Wenjie, Shengyuan Yang, Tian Tan, Xiaoxing Ma, Chang Xu, and Yue Li. "Context Sensitivity without Contexts: A Cut-Shortcut Approach to Fast and Precise Pointer Analysis." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 539–64. http://dx.doi.org/10.1145/3591242.
Full textLiu, Xia, Ming Lei, Hu Wei Liu, Yin Cao, and Xiao Hong Gao. "Risk Analysis of Quality and Safety for Laser Pointer with Remote Control." Advanced Materials Research 968 (June 2014): 263–66. http://dx.doi.org/10.4028/www.scientific.net/amr.968.263.
Full textLyde, Steven, William E. Byrd, and Matthew Might. "Control-flow analysis of dynamic languages via pointer analysis." ACM SIGPLAN Notices 51, no. 2 (2016): 54–62. http://dx.doi.org/10.1145/2936313.2816712.
Full textEllyana, Rossy Lydia, and I. Wayan Angga Wijaya Kusuma. "Penentuan Indeks Bias Kaca Berdasarkan Pola Interferensi Cahaya Laser Terhambur Menggunakan Cermin Datar “Berdebu”." Jurnal Teori dan Aplikasi Fisika 7, no. 2 (2019): 169–78. http://dx.doi.org/10.23960/jtaf.v7i2.2150.
Full textChase, David, Mark Wegman, and F. Ken Zadeck. "Analysis of pointers and structures." ACM SIGPLAN Notices 39, no. 4 (2004): 343–59. http://dx.doi.org/10.1145/989393.989429.
Full textChase, David R., Mark Wegman, and F. Kenneth Zadeck. "Analysis of pointers and structures." ACM SIGPLAN Notices 25, no. 6 (1990): 296–310. http://dx.doi.org/10.1145/93548.93585.
Full textLi, Yajun. "Ruled surfaces generated by Risley prism pointers: I. Pointing accuracy evaluation and enhancement based on a structural analysis of the scan field inside the pointer." Journal of the Optical Society of America A 38, no. 12 (2021): 1884. http://dx.doi.org/10.1364/josaa.435621.
Full textJunjie Wang, Xiaohong Li, Bobo Yan, and Zhiyong Feng. "Pointer Analysis Based Vulnerability Detection for Browser Extension." International Journal of Digital Content Technology and its Applications 6, no. 1 (2012): 488–95. http://dx.doi.org/10.4156/jdcta.vol6.issue1.59.
Full textWhaley, John, and Martin Rinard. "Compositional pointer and escape analysis for Java programs." ACM SIGPLAN Notices 34, no. 10 (1999): 187–206. http://dx.doi.org/10.1145/320385.320400.
Full textYong, Suan Hsi, Susan Horwitz, and Thomas Reps. "Pointer analysis for programs with structures and casting." ACM SIGPLAN Notices 34, no. 5 (1999): 91–103. http://dx.doi.org/10.1145/301631.301647.
Full text