Artículos de revistas sobre el tema "Pointer Analysi"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Pointer Analysi".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Shields, Denis C., Andrew Collins, and Angela Marlow. "Coding of pointers in the segregation analysis program POINTER." Genetic Epidemiology 11, no. 4 (1994): 385–87. http://dx.doi.org/10.1002/gepi.1370110408.
Texto completoZhou, Jinmeng, Ziyue Pan, Wenbo Shen, Xingkai Wang, Kangjie Lu, and Zhiyun Qian. "Type-Alias Analysis: Enabling LLVM IR with Accurate Types." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 2203–26. https://doi.org/10.1145/3728974.
Texto completoZou, Changwei, Dongjie He, Yulei Sui, and Jingling Xue. "TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers." Proceedings of the ACM on Software Engineering 1, FSE (2024): 1609–31. http://dx.doi.org/10.1145/3660779.
Texto completoMatsumoto, Aki, D. S. Han, and Takao Tsuda. "Alias analysis of pointers in Pascal and Fortran 90: dependence analysis between pointer references." Acta Informatica 33, no. 2 (1996): 99–130. http://dx.doi.org/10.1007/s002360050037.
Texto completoSmaragdakis, Yannis, and George Balatsouras. "Pointer Analysis." Foundations and Trends® in Programming Languages 2, no. 1 (2015): 1–69. http://dx.doi.org/10.1561/2500000014.
Texto completoSmaragdakis, Yannis, and George Balatsouras. "Pointer Analysis." Foundations and Trends® in Programming Languages 2, no. 1 (2015): 1–69. https://doi.org/10.1561/2500000014.
Texto completoWang, Shao-Chung, Lin-Ya Yu, Li-An Her, Yuan-Shin Hwang, and Jenq-Kuen Lee. "Pointer-Based Divergence Analysis for OpenCL 2.0 Programs." ACM Transactions on Parallel Computing 8, no. 4 (2021): 1–23. http://dx.doi.org/10.1145/3470644.
Texto completoHirzel, Martin, Daniel Von Dincklage, Amer Diwan, and Michael Hind. "Fast online pointer analysis." ACM Transactions on Programming Languages and Systems 29, no. 2 (2007): 11. http://dx.doi.org/10.1145/1216374.1216379.
Texto completoZhu, Jianwen, and Silvian Calman. "Symbolic pointer analysis revisited." ACM SIGPLAN Notices 39, no. 6 (2004): 145–57. http://dx.doi.org/10.1145/996893.996860.
Texto completoPeng-Sheng Chen, Yuan-Shin Hwang, R. D. C. Ju, and J. K. Lee. "Interprocedural probabilistic pointer analysis." IEEE Transactions on Parallel and Distributed Systems 15, no. 10 (2004): 893–907. http://dx.doi.org/10.1109/tpds.2004.56.
Texto completoSpoto, Fausto. "Precise null-pointer analysis." Software & Systems Modeling 10, no. 2 (2009): 219–52. http://dx.doi.org/10.1007/s10270-009-0132-5.
Texto completoHeintze, Nevin, and Olivier Tardieu. "Demand-driven pointer analysis." ACM SIGPLAN Notices 36, no. 5 (2001): 24–34. http://dx.doi.org/10.1145/381694.378802.
Texto completoHind, Michael, Michael Burke, Paul Carini, and Jong-Deok Choi. "Interprocedural pointer alias analysis." ACM Transactions on Programming Languages and Systems 21, no. 4 (1999): 848–94. http://dx.doi.org/10.1145/325478.325519.
Texto completoPetri, Aspasia, and Efthymios Karabetsos. "Extreme output power emitted by commercial laser pointers in Greece: A solely local or a global issue?" Journal of Laser Applications 34, no. 2 (2022): 022025. http://dx.doi.org/10.2351/7.0000664.
Texto completoThiessen, Rei, and Ondřej Lhoták. "Context transformations for pointer analysis." ACM SIGPLAN Notices 52, no. 6 (2017): 263–77. http://dx.doi.org/10.1145/3140587.3062359.
Texto completoRugina, Radu, and Martin Rinard. "Pointer analysis for multithreaded programs." ACM SIGPLAN Notices 34, no. 5 (1999): 77–90. http://dx.doi.org/10.1145/301631.301645.
Texto completoJianwen Zhu and S. Calman. "Context sensitive symbolic pointer analysis." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 24, no. 4 (2005): 516–31. http://dx.doi.org/10.1109/tcad.2005.844092.
Texto completoHorwitz, S., P. Pfeiffer, and T. Reps. "Dependence analysis for pointer variables." ACM SIGPLAN Notices 24, no. 7 (1989): 28–40. http://dx.doi.org/10.1145/74818.74821.
Texto completoBrauer, Jörg, Ralf Huuck, and Bastian Schlich. "Interprocedural Pointer Analysis in Goanna." Electronic Notes in Theoretical Computer Science 254 (October 2009): 65–83. http://dx.doi.org/10.1016/j.entcs.2009.09.060.
Texto completoVivien, Frédéric, and Martin Rinard. "Incrementalized pointer and escape analysis." ACM SIGPLAN Notices 36, no. 5 (2001): 35–46. http://dx.doi.org/10.1145/381694.378804.
Texto completoMachiry, Aravind, John Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, and Michael Hicks. "C to checked C by 3c." Proceedings of the ACM on Programming Languages 6, OOPSLA1 (2022): 1–29. http://dx.doi.org/10.1145/3527322.
Texto completoHind, Michael, and Anthony Pioli. "Which pointer analysis should I use?" ACM SIGSOFT Software Engineering Notes 25, no. 5 (2000): 113–23. http://dx.doi.org/10.1145/347636.348916.
Texto completoHardekopf, Ben, and Calvin Lin. "Semi-sparse flow-sensitive pointer analysis." ACM SIGPLAN Notices 44, no. 1 (2009): 226–38. http://dx.doi.org/10.1145/1594834.1480911.
Texto completoRugina, Radu, and Martin C. Rinard. "Pointer analysis for structured parallel programs." ACM Transactions on Programming Languages and Systems 25, no. 1 (2003): 70–116. http://dx.doi.org/10.1145/596980.596982.
Texto completoLiu, Bozhen, Jeff Huang, and Lawrence Rauchwerger. "Rethinking Incremental and Parallel Pointer Analysis." ACM Transactions on Programming Languages and Systems 41, no. 1 (2019): 1–31. http://dx.doi.org/10.1145/3293606.
Texto completoLiang, Yufei, Teng Zhang, Ganlin Li, et al. "Pointer Analysis for Database-Backed Applications." Proceedings of the ACM on Programming Languages 9, PLDI (2025): 1417–41. https://doi.org/10.1145/3729307.
Texto completoÇEZİKTÜRK, Özlem. "CONTENT ANALYSIS OF STUDENTS' CONSTRUCTIONS OF EIGHT POINTED, TEN POINTED, AND TWELVE POINTED STARS." Journal of Academic Social Sciences 75, no. 75 (2018): 244–54. http://dx.doi.org/10.16992/asos.13978.
Texto completoAbdulhadi, Zayid, and Walter Hengartner. "One Pointed Univalent Logharmonic Mappings." Journal of Mathematical Analysis and Applications 203, no. 2 (1996): 333–51. http://dx.doi.org/10.1006/jmaa.1996.0383.
Texto completoEl Abbadi, Nidhal. "New Algorithm for Text in Text Steganography." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 26, 2021): 99–112. http://dx.doi.org/10.55562/jrucs.v23i2.483.
Texto completoLi, Yue, Tian Tan, Anders Møller, and Yannis Smaragdakis. "Precision-guided context sensitivity for pointer analysis." Proceedings of the ACM on Programming Languages 2, OOPSLA (2018): 1–29. http://dx.doi.org/10.1145/3276511.
Texto completoZhang, Sean, Barbara G. Ryder, and William A. Landi. "Experiments with combined analysis for pointer aliasing." ACM SIGPLAN Notices 33, no. 7 (1998): 11–18. http://dx.doi.org/10.1145/277633.277635.
Texto completoPearce, David J., Paul H. J. Kelly, and Chris Hankin. "Efficient field-sensitive pointer analysis of C." ACM Transactions on Programming Languages and Systems 30, no. 1 (2007): 4. http://dx.doi.org/10.1145/1290520.1290524.
Texto completoSalcianu, Alexandru, and Martin Rinard. "Pointer and escape analysis for multithreaded programs." ACM SIGPLAN Notices 36, no. 7 (2001): 12–23. http://dx.doi.org/10.1145/568014.379553.
Texto completoGuyer, Samuel Z., and Calvin Lin. "Error checking with client-driven pointer analysis." Science of Computer Programming 58, no. 1-2 (2005): 83–114. http://dx.doi.org/10.1016/j.scico.2005.02.005.
Texto completoScholz, Berhard, Johann Blieberger, and Thomas Fahringer. "Symbolic pointer analysis for detecting memory leaks." ACM SIGPLAN Notices 34, no. 11 (1999): 104–13. http://dx.doi.org/10.1145/328691.328704.
Texto completoDas, Manuvir. "Unification-based pointer analysis with directional assignments." ACM SIGPLAN Notices 35, no. 5 (2000): 35–46. http://dx.doi.org/10.1145/358438.349309.
Texto completoCheng, Ben-Chung, and Wen-Mei W. Hwu. "Modular interprocedural pointer analysis using access paths." ACM SIGPLAN Notices 35, no. 5 (2000): 57–69. http://dx.doi.org/10.1145/358438.349311.
Texto completoDa Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGOPS Operating Systems Review 40, no. 5 (2006): 416–25. http://dx.doi.org/10.1145/1168917.1168908.
Texto completoDa Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGPLAN Notices 41, no. 11 (2006): 416–25. http://dx.doi.org/10.1145/1168918.1168908.
Texto completoDa Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGARCH Computer Architecture News 34, no. 5 (2006): 416–25. http://dx.doi.org/10.1145/1168919.1168908.
Texto completoMa, Wenjie, Shengyuan Yang, Tian Tan, Xiaoxing Ma, Chang Xu, and Yue Li. "Context Sensitivity without Contexts: A Cut-Shortcut Approach to Fast and Precise Pointer Analysis." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 539–64. http://dx.doi.org/10.1145/3591242.
Texto completoLiu, Xia, Ming Lei, Hu Wei Liu, Yin Cao, and Xiao Hong Gao. "Risk Analysis of Quality and Safety for Laser Pointer with Remote Control." Advanced Materials Research 968 (June 2014): 263–66. http://dx.doi.org/10.4028/www.scientific.net/amr.968.263.
Texto completoLyde, Steven, William E. Byrd, and Matthew Might. "Control-flow analysis of dynamic languages via pointer analysis." ACM SIGPLAN Notices 51, no. 2 (2016): 54–62. http://dx.doi.org/10.1145/2936313.2816712.
Texto completoEllyana, Rossy Lydia, and I. Wayan Angga Wijaya Kusuma. "Penentuan Indeks Bias Kaca Berdasarkan Pola Interferensi Cahaya Laser Terhambur Menggunakan Cermin Datar “Berdebu”." Jurnal Teori dan Aplikasi Fisika 7, no. 2 (2019): 169–78. http://dx.doi.org/10.23960/jtaf.v7i2.2150.
Texto completoChase, David, Mark Wegman, and F. Ken Zadeck. "Analysis of pointers and structures." ACM SIGPLAN Notices 39, no. 4 (2004): 343–59. http://dx.doi.org/10.1145/989393.989429.
Texto completoChase, David R., Mark Wegman, and F. Kenneth Zadeck. "Analysis of pointers and structures." ACM SIGPLAN Notices 25, no. 6 (1990): 296–310. http://dx.doi.org/10.1145/93548.93585.
Texto completoLi, Yajun. "Ruled surfaces generated by Risley prism pointers: I. Pointing accuracy evaluation and enhancement based on a structural analysis of the scan field inside the pointer." Journal of the Optical Society of America A 38, no. 12 (2021): 1884. http://dx.doi.org/10.1364/josaa.435621.
Texto completoJunjie Wang, Xiaohong Li, Bobo Yan, and Zhiyong Feng. "Pointer Analysis Based Vulnerability Detection for Browser Extension." International Journal of Digital Content Technology and its Applications 6, no. 1 (2012): 488–95. http://dx.doi.org/10.4156/jdcta.vol6.issue1.59.
Texto completoWhaley, John, and Martin Rinard. "Compositional pointer and escape analysis for Java programs." ACM SIGPLAN Notices 34, no. 10 (1999): 187–206. http://dx.doi.org/10.1145/320385.320400.
Texto completoYong, Suan Hsi, Susan Horwitz, and Thomas Reps. "Pointer analysis for programs with structures and casting." ACM SIGPLAN Notices 34, no. 5 (1999): 91–103. http://dx.doi.org/10.1145/301631.301647.
Texto completo