Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Heap-manipulating programs“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Heap-manipulating programs" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Heap-manipulating programs"
Kostyukov, Yu O., K. A. Batoev, D. A. Mordvinov, M. P. Kostitsyn und A. V. Misonizhnik. „Automatic verification of heap-manipulating programs“. Proceedings of the Institute for System Programming of the RAS 31, Nr. 5 (2019): 37–62. http://dx.doi.org/10.15514/ispras-2019-31(5)-3.
Der volle Inhalt der QuelleWatanabe, Yasunari, Kiran Gopinathan, George Pîrlea, Nadia Polikarpova und Ilya Sergey. „Certifying the synthesis of heap-manipulating programs“. Proceedings of the ACM on Programming Languages 5, ICFP (22.08.2021): 1–29. http://dx.doi.org/10.1145/3473589.
Der volle Inhalt der QuellePolikarpova, Nadia, und Ilya Sergey. „Structuring the synthesis of heap-manipulating programs“. Proceedings of the ACM on Programming Languages 3, POPL (02.01.2019): 1–30. http://dx.doi.org/10.1145/3290385.
Der volle Inhalt der QuelleMagill, Stephen, Ming-Hsien Tsai, Peter Lee und Yih-Kuen Tsay. „Automatic numeric abstractions for heap-manipulating programs“. ACM SIGPLAN Notices 45, Nr. 1 (02.01.2010): 211–22. http://dx.doi.org/10.1145/1707801.1706326.
Der volle Inhalt der QuelleNanevski, Aleksandar, Viktor Vafeiadis und Josh Berdine. „Structuring the verification of heap-manipulating programs“. ACM SIGPLAN Notices 45, Nr. 1 (02.01.2010): 261–74. http://dx.doi.org/10.1145/1707801.1706331.
Der volle Inhalt der QuelleWinterstein, Felix, Kermin E. Fleming, Hsin-Jung Yang und George A. Constantinides. „Custom Multicache Architectures for Heap Manipulating Programs“. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 36, Nr. 5 (Mai 2017): 761–74. http://dx.doi.org/10.1109/tcad.2016.2608861.
Der volle Inhalt der QuelleALBERT, ELVIRA, MARÍA GARCÍA DE LA BANDA, MIGUEL GÓMEZ-ZAMALLOA, JOSÉ MIGUEL ROJAS und PETER STUCKEY. „A CLP heap solver for test case generation“. Theory and Practice of Logic Programming 13, Nr. 4-5 (Juli 2013): 721–35. http://dx.doi.org/10.1017/s1471068413000458.
Der volle Inhalt der QuelleQin, Shengchao, Guanhua He, Chenguang Luo, Wei-Ngan Chin und Hongli Yang. „Automatically refining partial specifications for heap-manipulating programs“. Science of Computer Programming 82 (März 2014): 56–76. http://dx.doi.org/10.1016/j.scico.2013.03.004.
Der volle Inhalt der QuelleYahav, Eran, und Mooly Sagiv. „Verifying safety properties of concurrent heap-manipulating programs“. ACM Transactions on Programming Languages and Systems 32, Nr. 5 (Mai 2010): 1–50. http://dx.doi.org/10.1145/1745312.1745315.
Der volle Inhalt der QuelleYorsh, Greta, Alexey Skidanov, Thomas Reps und Mooly Sagiv. „Automatic Assume/Guarantee Reasoning for Heap-Manipulating Programs“. Electronic Notes in Theoretical Computer Science 131 (Mai 2005): 125–38. http://dx.doi.org/10.1016/j.entcs.2005.01.028.
Der volle Inhalt der QuelleDissertationen zum Thema "Heap-manipulating programs"
Gotsman, Olexiy. „Logics and analyses for concurrent heap-manipulating programs“. Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611774.
Der volle Inhalt der QuelleDrăgoi, Cezara. „Automated verification of heap-manipulating programs with infinite data“. Paris 7, 2011. http://www.theses.fr/2011PA077189.
Der volle Inhalt der QuelleIn this thesis, we focus on the verification of safety properties for sequential programs manipulating dynamic data structures carrying unbounded data. We develop a logic-based framework where program specifications are given by formulas. First, we address the issue of automatizing pre/post-condition reasoning. We define a logic, called CSL, for the specification of linked structures or arrays, as well as compositions of these structures. The formulas in CSL can describe reachability relations between cells in the heap following some pointer fields, the size of the heap, and the scalar data, We prove that the satisfiability problem of CSL is decidable and that CSL is closed under the computation of the strongest post-condition. Second, we address the issue of automatic synthesis of assertions for programs with singly-linked lists. We define an abstract interpretation based framework which combines a specific finite-range abstraction on the shape of the heap with an abstract domain on sequences of data. Different abstractions on sequences are considered allowing to reason about their sizes, the multisets of their elements, or relations on their data at different positions. We define an interprocedural analysis that computes the effect of each procedure in a local manner, by considering only the part of the heap reachable from its actual parameters. We have implemented our techniques in a tool which shows that our approach is powerful enough for automatic generation of non-trivial procedure summaries and pre/post-condition reasoning
Magill, Stephen. „Instrumentation Analysis: An Automated Method for Producing Numeric Abstractions of Heap-Manipulating Programs“. Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/73.
Der volle Inhalt der Quelle(5930306), Chenguang Sun. „Demand-Driven Static Analysis of Heap-Manipulating Programs“. Thesis, 2019.
Den vollen Inhalt der Quelle findenRakamarić, Zvonimir. „A logic and decision procedure for verification of heap-manipulating programs“. Thesis, 2006. http://hdl.handle.net/2429/18130.
Der volle Inhalt der QuelleScience, Faculty of
Computer Science, Department of
Graduate
Buchteile zum Thema "Heap-manipulating programs"
Pham, Long H., Quang Loc Le, Quoc-Sang Phan und Jun Sun. „Concolic Testing Heap-Manipulating Programs“. In Lecture Notes in Computer Science, 442–61. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30942-8_27.
Der volle Inhalt der QuelleAlbert, Elvira, Richard Bubel, Samir Genaim, Reiner Hähnle und Guillermo Román-Díez. „Verified Resource Guarantees for Heap Manipulating Programs“. In Fundamental Approaches to Software Engineering, 130–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28872-2_10.
Der volle Inhalt der QuelleRoy, Subhajit. „From Concrete Examples to Heap Manipulating Programs“. In Static Analysis, 126–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38856-9_9.
Der volle Inhalt der QuelleItzhaky, Shachar, Hila Peleg, Nadia Polikarpova, Reuben N. S. Rowe und Ilya Sergey. „Deductive Synthesis of Programs with Pointers: Techniques, Challenges, Opportunities“. In Computer Aided Verification, 110–34. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_5.
Der volle Inhalt der QuelleBrain, Martin, Cristina David, Daniel Kroening und Peter Schrammel. „Model and Proof Generation for Heap-Manipulating Programs“. In Programming Languages and Systems, 432–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54833-8_23.
Der volle Inhalt der QuelleQin, Shengchao, Chenguang Luo, Guanhua He, Florin Craciun und Wei-Ngan Chin. „Verifying Heap-Manipulating Programs with Unknown Procedure Calls“. In Formal Methods and Software Engineering, 171–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16901-4_13.
Der volle Inhalt der QuelleCostea, Andreea, Amy Zhu, Nadia Polikarpova und Ilya Sergey. „Concise Read-Only Specifications for Better Synthesis of Programs with Pointers“. In Programming Languages and Systems, 141–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_6.
Der volle Inhalt der QuelleGherghina, Cristian, Cristina David, Shengchao Qin und Wei-Ngan Chin. „Structured Specifications for Better Verification of Heap-Manipulating Programs“. In Lecture Notes in Computer Science, 386–401. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21437-0_29.
Der volle Inhalt der QuelleYang, Hongseok. „Automatic Verification of Heap-Manipulating Programs Using Separation Logic“. In Computer Science - Theory and Applications, 25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03351-3_4.
Der volle Inhalt der QuelleNguyen, Thanh-Toan, Quang-Trung Ta, Ilya Sergey und Wei-Ngan Chin. „Automated Repair of Heap-Manipulating Programs Using Deductive Synthesis“. In Lecture Notes in Computer Science, 376–400. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67067-2_17.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Heap-manipulating programs"
Magill, Stephen, Ming-Hsien Tsai, Peter Lee und Yih-Kuen Tsay. „Automatic numeric abstractions for heap-manipulating programs“. In the 37th annual ACM SIGPLAN-SIGACT symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1706299.1706326.
Der volle Inhalt der QuelleNanevski, Aleksandar, Viktor Vafeiadis und Josh Berdine. „Structuring the verification of heap-manipulating programs“. In the 37th annual ACM SIGPLAN-SIGACT symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1706299.1706331.
Der volle Inhalt der QuelleMalik, Viktor, Martin Hruska, Peter Schrammel und Tomas Vojnar. „Template-Based Verification of Heap-Manipulating Programs“. In 2018 Formal Methods in Computer Aided Design (FMCAD). IEEE, 2018. http://dx.doi.org/10.23919/fmcad.2018.8603009.
Der volle Inhalt der QuelleDong, Longming, Ji Wang und Liqian Chen. „Modular Heap Abstraction-Based Memory Leak Detection for Heap-Manipulating Programs“. In 2012 19th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2012. http://dx.doi.org/10.1109/apsec.2012.35.
Der volle Inhalt der QuelleDong, Longming, Ji Wang und Liqian Chen. „Modular Heap Abstraction-Based Code Clone Detection for Heap-Manipulating Programs“. In 2012 12th International Conference on Quality Software (QSIC 2012). IEEE, 2012. http://dx.doi.org/10.1109/qsic.2012.37.
Der volle Inhalt der QuelleJančík, Pavel, und Jan Kofroň. „Dead variable analysis for multi-threaded heap manipulating programs“. In SAC 2016: Symposium on Applied Computing. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2851613.2851826.
Der volle Inhalt der QuelleDillig, Isil, Thomas Dillig, Alex Aiken und Mooly Sagiv. „Precise and compact modular procedure summaries for heap manipulating programs“. In the 32nd ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1993498.1993565.
Der volle Inhalt der Quelle