Academic literature on the topic 'Programs with pointers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Programs with pointers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Programs with pointers"
Møller, Anders. "Verifying Programs that Manipulate Pointers." Electronic Notes in Theoretical Computer Science 98 (August 2004): 3–4. http://dx.doi.org/10.1016/j.entcs.2003.10.002.
Full textAmme, Wolfram, and Eberhard Zehendner. "Data dependence analysis in programs with pointers." Parallel Computing 24, no. 3-4 (May 1998): 505–25. http://dx.doi.org/10.1016/s0167-8191(98)00023-4.
Full textEisenbarth, Thomas, Rainer Koschke, and Gunther Vogel. "Static object trace extraction for programs with pointers." Journal of Systems and Software 77, no. 3 (September 2005): 263–84. http://dx.doi.org/10.1016/j.jss.2004.04.028.
Full textMilanova, Ana, Atanas Rountev, and Barbara G. Ryder. "Precise Call Graphs for C Programs with Function Pointers." Automated Software Engineering 11, no. 1 (January 2004): 7–26. http://dx.doi.org/10.1023/b:ause.0000008666.56394.a1.
Full textShelekhov, V. I. "Applying Program Transformations for Deductive Verification of the List Reverse Program." Programmnaya Ingeneria 12, no. 3 (May 19, 2021): 127–39. http://dx.doi.org/10.17587/prin.12.127-139.
Full textHalpern, Leslie F. "Some Pointers for Students Interested in Applying to Graduate Programs in Clinical Psychology." Eye on Psi Chi Magazine 6, no. 2 (2002): 21–23. http://dx.doi.org/10.24839/1092-0803.eye6.2.21.
Full textChung, In-Sang. "Automated Test Data Generation for Testing Programs with Multi-level Stack-directed Pointers." KIPS Transactions:PartD 17D, no. 4 (August 31, 2010): 297–310. http://dx.doi.org/10.3745/kipstd.2010.17d.4.297.
Full textLivshits, V. Benjamin, and Monica S. Lam. "Tracking pointers with path and context sensitivity for bug detection in C programs." ACM SIGSOFT Software Engineering Notes 28, no. 5 (September 2003): 317–26. http://dx.doi.org/10.1145/949952.940114.
Full textWatanabe, Yasunari, Kiran Gopinathan, George Pîrlea, Nadia Polikarpova, and Ilya Sergey. "Certifying the synthesis of heap-manipulating programs." Proceedings of the ACM on Programming Languages 5, ICFP (August 22, 2021): 1–29. http://dx.doi.org/10.1145/3473589.
Full textAtto, Muhsin H. "Graph Inclusion and Matching Algorithms for Programs Manipulating Singly linked Heaps." Science Journal of University of Zakho 9, no. 1 (March 30, 2021): 30–37. http://dx.doi.org/10.25271/sjuoz.2021.9.1.778.
Full textDissertations / Theses on the topic "Programs with pointers"
Liang, Donglin. "Developing practical program analyses for programs with pointers." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/8203.
Full textTafat, Asma. "Preuves par raffinement de programmes avec pointeurs." Phd thesis, Université Paris Sud - Paris XI, 2013. http://tel.archives-ouvertes.fr/tel-00874679.
Full textMuehlberg, Jan Tobias. "Model checking pointer safety in compiled programs." Thesis, University of York, 2009. http://etheses.whiterose.ac.uk/841/.
Full textLuo, Chenguang. "Verification of pointer-based programs with partial information." Thesis, Durham University, 2011. http://etheses.dur.ac.uk/578/.
Full textSălcianu, Alexandru D. (Alexandru Doru) 1975. "Pointer analysis and its applications for Java programs." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86781.
Full textIncludes bibliographical references (p. 135-137).
by Alexandru D. Sălcianu.
S.M.
Wang, Jian. "Pointer analysis in Java programs using execution path information /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20WANG.
Full textSălcianu, Alexandru D. (Alexandru Doru) 1975. "Pointer analysis for Java programs : novel techniques and applications." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/38311.
Full textIncludes bibliographical references (p. 193-200).
This dissertation presents a pointer analysis for Java programs, together with several practical analysis applications. For each program point, the analysis is able to construct a points-to graph that describes how local variables and object fields point to objects. Each points-to graph also contains escape information that identifies the objects that are reachable from outside the analysis scope. Our pointer analysis can extract correct information by analyzing only parts of a whole program. First, our analysis analyzes a method without requiring information about its calling context. Instead, our analysis computes parameterized results that are later instantiated for each relevant call site. Second, our analysis correctly handles calls to unanalyzable methods (e.g., native methods). Hence, our analysis can trade precision for speed without sacrificing correctness: if the analysis of a call to a specific callee requires too much time, the analysis can treat that callee as unanalyzable. The results of our analysis enable standard program optimizations like the stack allocation of local objects. More interestingly, this dissertation explains how to extend the analysis to detect pure methods.
(cont.) Our analysis supports a flexible definition of method purity: a method is pure if it does not mutate any object that exists in the program state before the start of the method. Therefore, our analysis allows pure methods to allocate and mutate temporary objects (e.g., iterators) and/or construct complex object structures and return them as a result.
by Alexandru D. Sălcianu.
Ph.D.
Rieger, Stefan Verfasser], and Joost-Pieter [Akademischer Betreuer] [Katoen. "Verification of pointer programs / Stefan Rieger ; Betreuer: Joost-Pieter Katoen." Aachen : Universitätsbibliothek der RWTH Aachen, 2009. http://d-nb.info/1128316080/34.
Full textRieger, Stefan [Verfasser], and Joost-Pieter [Akademischer Betreuer] Katoen. "Verification of pointer programs / Stefan Rieger ; Betreuer: Joost-Pieter Katoen." Aachen : Universitätsbibliothek der RWTH Aachen, 2009. http://d-nb.info/1128316080/34.
Full textSimacek, Jiri. "Vérification de programmes avec structures de données complexes." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00805794.
Full textBooks on the topic "Programs with pointers"
Richard, Petersen. Introductory C: Pointers, functions and files. London: Academic Press, 1992.
Find full textPetersen, Richard. Introductory C: Pointers, function, and files. 2nd ed. San Diego, CA: Academic Press, 1997.
Find full textDaconta, Michael C. C++ pointers and dynamic memory management. New York: Wiley, 1995.
Find full textMastering C pointers: Tools for programming power. 2nd ed. Boston: AP Professional, 1993.
Find full textBook chapters on the topic "Programs with pointers"
Matsushita, Yusuke, Takeshi Tsukada, and Naoki Kobayashi. "RustHorn: CHC-Based Verification for Rust Programs." In Programming Languages and Systems, 484–514. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_18.
Full textJaloyan, Georges-Axel, Claire Dross, Maroua Maalej, Yannick Moy, and Andrei Paskevich. "Verification of Programs with Pointers in SPARK." In Formal Methods and Software Engineering, 55–72. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63406-3_4.
Full textVanoverberghe, Dries, Nikolai Tillmann, and Frank Piessens. "Test Input Generation for Programs with Pointers." In Tools and Algorithms for the Construction and Analysis of Systems, 277–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00768-2_25.
Full textde Boer, Frank, Marcello Bonsangue, and Jurriaan Rot. "Automated Verification of Recursive Programs with Pointers." In Automated Reasoning, 149–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31365-3_14.
Full textAssaf, Mounir, Julien Signoles, Frédéric Tronel, and Éric Totel. "Program Transformation for Non-interference Verification on Programs with Pointers." In Security and Privacy Protection in Information Processing Systems, 231–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_18.
Full textCostea, Andreea, Amy Zhu, Nadia Polikarpova, and Ilya Sergey. "Concise Read-Only Specifications for Better Synthesis of Programs with Pointers." In Programming Languages and Systems, 141–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_6.
Full textItzhaky, Shachar, Hila Peleg, Nadia Polikarpova, Reuben N. S. Rowe, and Ilya Sergey. "Deductive Synthesis of Programs with Pointers: Techniques, Challenges, Opportunities." In Computer Aided Verification, 110–34. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_5.
Full textAsăvoae, Irina Măriuca, Frank de Boer, Marcello M. Bonsangue, Dorel Lucanu, and Jurriaan Rot. "Bounded Model Checking of Recursive Programs with Pointers in K." In Recent Trends in Algebraic Development Techniques, 59–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37635-1_4.
Full textRocha, Herbert, Rafael Menezes, Lucas C. Cordeiro, and Raimundo Barreto. "Map2Check: Using Symbolic Execution and Fuzzing." In Tools and Algorithms for the Construction and Analysis of Systems, 403–7. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45237-7_29.
Full textAmme, W., and E. Zehendner. "Experiences in analyzing data dependences for programs with pointers and structures." In Euro-Par'97 Parallel Processing, 342–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0002754.
Full textConference papers on the topic "Programs with pointers"
McGuire, Morgan. "GUIs for real-time programs using universal pointers." In ACM SIGGRAPH 2008 posters. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1400885.1400973.
Full textWang, Dexter, and Michael Anapol. "Ultra-lightweight telescopes and precision pointers as enabling technologies for small, low cost missions." In Space Programs and Technologies Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1995. http://dx.doi.org/10.2514/6.1995-3602.
Full textEl-Korashy, Akram, Stelios Tsampas, Marco Patrignani, Dominique Devriese, Deepak Garg, and Frank Piessens. "CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle." In 2021 IEEE 34th Computer Security Foundations Symposium (CSF). IEEE, 2021. http://dx.doi.org/10.1109/csf51468.2021.00036.
Full textWang, Wei, Zhong Shao, Xinyu Jiang, and Yu Guo. "A Simple Model for Certifying Assembly Programs with First-Class Function Pointers." In 2011 IEEE 5th International Symposium on Theoretical Aspects of Software Engineering (TASE). IEEE, 2011. http://dx.doi.org/10.1109/tase.2011.16.
Full textLivshits, V. Benjamin, and Monica S. Lam. "Tracking pointers with path and context sensitivity for bug detection in C programs." In the 9th European software engineering conference held jointly with 10th ACM SIGSOFT international symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/940071.940114.
Full textHofmann, Martin, and Ulrich Schopp. "Pointer Programs and Undirected Reachability." In 2009 24th Annual IEEE Symposium on Logic In Computer Science (LICS). IEEE, 2009. http://dx.doi.org/10.1109/lics.2009.41.
Full textRugina, Radu, and Martin Rinard. "Pointer analysis for multithreaded programs." In the ACM SIGPLAN 1999 conference. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/301618.301645.
Full textNanda, Mangala Gowri, and S. Ramesh. "Pointer analysis of multithreaded Java programs." In the 2003 ACM symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/952532.952741.
Full textZhang, Sean, Barbara G. Ryder, and William Landi. "Program decomposition for pointer aliasing." In the 4th ACM SIGSOFT symposium. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/239098.239112.
Full textFarzan, Azadeh, P. Madhusudan, Niloofar Razavi, and Francesco Sorrentino. "Predicting null-pointer dereferences in concurrent programs." In the ACM SIGSOFT 20th International Symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2393596.2393651.
Full textReports on the topic "Programs with pointers"
Binkley, David W., and James R. Lyle. Application of the pointer state subgraph to static program slicing. Gaithersburg, MD: National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5799.
Full textDuke, D., K. Magrini, V. McLane, and K. Wieda. Review of laboratory programs for women Points-of-Contact Committee. Office of Scientific and Technical Information (OSTI), June 1995. http://dx.doi.org/10.2172/106412.
Full textReyes, Angela, Benjamin Roseth, and Diego A. Vera-Cossio. Technology, Identification, and Access to Social Programs: Experimental Evidence from Panama. Inter-American Development Bank, August 2021. http://dx.doi.org/10.18235/0003485.
Full textByers, Loren W. Second Line of Defense Program Secondary Screening Field Data Collection--Talking Points. Office of Scientific and Technical Information (OSTI), April 2013. http://dx.doi.org/10.2172/1073744.
Full textMangasarian, O. L. Computable Numerical Bounds for Lagrange Multipliers of Stationary Points of Nonconvex Differentiable Nonlinear Programs. Fort Belvoir, VA: Defense Technical Information Center, January 1985. http://dx.doi.org/10.21236/ada153513.
Full textAraujo, María Caridad, Marta Rubio-Codina, and Norbert Schady. 70 to 700 to 70,000: Lessons from the Jamaica Experiment. Inter-American Development Bank, April 2021. http://dx.doi.org/10.18235/0003210.
Full textMcLane, V., and A. Layne. Department of Energy Review of Laboratory Programs for Women Points-of-Contact Committee: Comparative Report, June 1995. Office of Scientific and Technical Information (OSTI), June 1995. http://dx.doi.org/10.2172/1089592.
Full textReyes, Angela, Benjamin Roseth, and Diego A. Vera-Cossio. Research Insights: How Digital Tools Increase Access to Government Services and Social Programs through On-time Renewals of IDs. Inter-American Development Bank, August 2021. http://dx.doi.org/10.18235/0003572.
Full textGeyer, Anton. Assessment des FFG-Programms „F&E-Infrastrukturförderung“. Inspire research Beratungsgesellschaft m.b.H., March 2020. http://dx.doi.org/10.22163/fteval.2020.497.
Full textDubeck, Margaret M., Jonathan M. B. Stern, and Rehemah Nabacwa. Learning to Read in a Local Language in Uganda: Creating Learner Profiles to Track Progress and Guide Instruction Using Early Grade Reading Assessment Results. RTI Press, June 2021. http://dx.doi.org/10.3768/rtipress.2021.op.0068.2106.
Full text