Auswahl der wissenschaftlichen Literatur zum Thema „Heap-manipulating programs“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Heap-manipulating programs" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Heap-manipulating programs"

1

Kostyukov, Yu O., K. A. Batoev, D. A. Mordvinov, M. P. Kostitsyn, and A. V. Misonizhnik. "Automatic verification of heap-manipulating programs." Proceedings of the Institute for System Programming of the RAS 31, no. 5 (2019): 37–62. http://dx.doi.org/10.15514/ispras-2019-31(5)-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

ALBERT, ELVIRA, MARÍA GARCÍA DE LA BANDA, MIGUEL GÓMEZ-ZAMALLOA, JOSÉ MIGUEL ROJAS, and PETER STUCKEY. "A CLP heap solver for test case generation." Theory and Practice of Logic Programming 13, no. 4-5 (2013): 721–35. http://dx.doi.org/10.1017/s1471068413000458.

Der volle Inhalt der Quelle
Annotation:
AbstractOne of the main challenges to software testing today is to efficiently handle heap-manipulating programs. These programs often build complex, dynamically allocated data structures during execution and, to ensure reliability, the testing process needs to consider all possible shapes these data structures can take. This creates scalability issues since high (often exponential) numbers of shapes may be built due to the aliasing of references. This paper presents a novel CLP heap solver for the test case generation of heap-manipulating programs that is more scalable than previous proposals
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Watanabe, Yasunari, Kiran Gopinathan, George Pîrlea, Nadia Polikarpova, and Ilya Sergey. "Certifying the synthesis of heap-manipulating programs." Proceedings of the ACM on Programming Languages 5, ICFP (2021): 1–29. http://dx.doi.org/10.1145/3473589.

Der volle Inhalt der Quelle
Annotation:
Automated deductive program synthesis promises to generate executable programs from concise specifications, along with proofs of correctness that can be independently verified using third-party tools. However, an attempt to exercise this promise using existing proof-certification frameworks reveals significant discrepancies in how proof derivations are structured for two different purposes: program synthesis and program verification. These discrepancies make it difficult to use certified verifiers to validate synthesis results, forcing one to write an ad-hoc translation procedure from synthesi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Magill, Stephen, Ming-Hsien Tsai, Peter Lee, and Yih-Kuen Tsay. "Automatic numeric abstractions for heap-manipulating programs." ACM SIGPLAN Notices 45, no. 1 (2010): 211–22. http://dx.doi.org/10.1145/1707801.1706326.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Nanevski, Aleksandar, Viktor Vafeiadis, and Josh Berdine. "Structuring the verification of heap-manipulating programs." ACM SIGPLAN Notices 45, no. 1 (2010): 261–74. http://dx.doi.org/10.1145/1707801.1706331.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Polikarpova, Nadia, and Ilya Sergey. "Structuring the synthesis of heap-manipulating programs." Proceedings of the ACM on Programming Languages 3, POPL (2019): 1–30. http://dx.doi.org/10.1145/3290385.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Winterstein, Felix, Kermin E. Fleming, Hsin-Jung Yang, and George A. Constantinides. "Custom Multicache Architectures for Heap Manipulating Programs." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 36, no. 5 (2017): 761–74. http://dx.doi.org/10.1109/tcad.2016.2608861.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Qin, Shengchao, Guanhua He, Chenguang Luo, Wei-Ngan Chin, and Hongli Yang. "Automatically refining partial specifications for heap-manipulating programs." Science of Computer Programming 82 (March 2014): 56–76. http://dx.doi.org/10.1016/j.scico.2013.03.004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Yahav, Eran, and Mooly Sagiv. "Verifying safety properties of concurrent heap-manipulating programs." ACM Transactions on Programming Languages and Systems 32, no. 5 (2010): 1–50. http://dx.doi.org/10.1145/1745312.1745315.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Yorsh, Greta, Alexey Skidanov, Thomas Reps, and Mooly Sagiv. "Automatic Assume/Guarantee Reasoning for Heap-Manipulating Programs." Electronic Notes in Theoretical Computer Science 131 (May 2005): 125–38. http://dx.doi.org/10.1016/j.entcs.2005.01.028.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Heap-manipulating programs"

1

Gotsman, Olexiy. "Logics and analyses for concurrent heap-manipulating programs." Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611774.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Drăgoi, Cezara. "Automated verification of heap-manipulating programs with infinite data." Paris 7, 2011. http://www.theses.fr/2011PA077189.

Der volle Inhalt der Quelle
Annotation:
Le développement de techniques rigoureuses et automatiques pour la vérification des systèmes logiciels est une tâche importante. Cette thèse porte sur la vérification des propriétés de sûreté pour des programmes avec mémoire dynamique et données infinies. Elle développe un cadre basé sur la logique où les spécifications des programmes sont données par des formules. Premièrement, nous considérons l'automatisation du raisonnement pré/post-condition. Nous définissons une logique, appelée CSL, pour la spécification des structures chaînées ou des tableaux, ainsi que des compositions de ces structur
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Magill, Stephen. "Instrumentation Analysis: An Automated Method for Producing Numeric Abstractions of Heap-Manipulating Programs." Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/73.

Der volle Inhalt der Quelle
Annotation:
A number of questions regarding programs involving heap-based data structures can be phrased as questions about numeric properties of those structures. A data structure traversal might terminate if the length of some path is eventually zero or a function to remove n elements from a collection may only be safe if the collection has size at least n. In this thesis, we develop proof methods for reasoning about the connection between heap-manipulating programs and numeric programs. In addition, we develop an automatic method for producing numeric abstractions of heap-manipulating programs. These n
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

(5930306), Chenguang Sun. "Demand-Driven Static Analysis of Heap-Manipulating Programs." Thesis, 2019.

Den vollen Inhalt der Quelle finden
Annotation:
<div>Modern Java application frameworks present significant challenges for existing static analysis algorithms. Such challenges include large-scale code bases, heap-carried dependency, and asynchronous control flow caused by message passing.</div><div>Existing analysis algorithms are not suitable to deal with these challenges. One reason is that analyses are typically designed to operate homogeneously on the whole program. This leads to scalability problems when the analysis algorithms are used on applications built as plug-ins of large frameworks, since the framework code is analyzed together
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Rakamarić, Zvonimir. "A logic and decision procedure for verification of heap-manipulating programs." Thesis, 2006. http://hdl.handle.net/2429/18130.

Der volle Inhalt der Quelle
Annotation:
Heap-manipulating programs (HMPs), which manipulate unbounded linked data structures via pointers, are a major frontier for formal verification of software. Formal verification is the process of proving (or disproving) the correctness of a system with respect to some kind of formal specification or property. The primary contributions of this thesis are the definition of a simple transitive closure logic tailored for formal verification of HMPs, and an efficient decision procedure for this logic. To assess the effectiveness of the proposed approach, we develop an HMP verification framework, whi
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Heap-manipulating programs"

1

University of Cambridge. Computer Laboratory, Churchill College, British Computer Society, and Council of Professors and Heads of Computing (Great Britain), eds. Logics and analyses for concurrent heap-manipulating programs. [British Computer Society], 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Heap-manipulating programs"

1

Pham, Long H., Quang Loc Le, Quoc-Sang Phan, and Jun Sun. "Concolic Testing Heap-Manipulating Programs." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30942-8_27.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Albert, Elvira, Richard Bubel, Samir Genaim, Reiner Hähnle, and Guillermo Román-Díez. "Verified Resource Guarantees for Heap Manipulating Programs." In Fundamental Approaches to Software Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28872-2_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Roy, Subhajit. "From Concrete Examples to Heap Manipulating Programs." In Static Analysis. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38856-9_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Itzhaky, Shachar, Hila Peleg, Nadia Polikarpova, Reuben N. S. Rowe, and Ilya Sergey. "Deductive Synthesis of Programs with Pointers: Techniques, Challenges, Opportunities." In Computer Aided Verification. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_5.

Der volle Inhalt der Quelle
Annotation:
Abstract This paper presents the main ideas behind deductive synthesis of heap-manipulating program and outlines present challenges faced by this approach as well as future opportunities for its applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Costea, Andreea, Amy Zhu, Nadia Polikarpova, and Ilya Sergey. "Concise Read-Only Specifications for Better Synthesis of Programs with Pointers." In Programming Languages and Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_6.

Der volle Inhalt der Quelle
Annotation:
AbstractIn program synthesis there is a well-known trade-off between concise and strong specifications: if a specification is too verbose, it might be harder to write than the program; if it is too weak, the synthesised program might not match the user’s intent. In this work we explore the use of annotations for restricting memory access permissions in program synthesis, and show that they can make specifications much stronger while remaining surprisingly concise. Specifically, we enhance Synthetic Separation Logic (SSL), a framework for synthesis of heap-manipulating programs, with the logica
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Qin, Shengchao, Chenguang Luo, Guanhua He, Florin Craciun, and Wei-Ngan Chin. "Verifying Heap-Manipulating Programs with Unknown Procedure Calls." In Formal Methods and Software Engineering. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16901-4_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Brain, Martin, Cristina David, Daniel Kroening, and Peter Schrammel. "Model and Proof Generation for Heap-Manipulating Programs." In Programming Languages and Systems. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54833-8_23.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Yang, Hongseok. "Automatic Verification of Heap-Manipulating Programs Using Separation Logic." In Computer Science - Theory and Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03351-3_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Gherghina, Cristian, Cristina David, Shengchao Qin, and Wei-Ngan Chin. "Structured Specifications for Better Verification of Heap-Manipulating Programs." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21437-0_29.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Nguyen, Thanh-Toan, Quang-Trung Ta, Ilya Sergey, and Wei-Ngan Chin. "Automated Repair of Heap-Manipulating Programs Using Deductive Synthesis." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67067-2_17.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Heap-manipulating programs"

1

Magill, Stephen, Ming-Hsien Tsai, Peter Lee, and Yih-Kuen Tsay. "Automatic numeric abstractions for heap-manipulating programs." In the 37th annual ACM SIGPLAN-SIGACT symposium. ACM Press, 2010. http://dx.doi.org/10.1145/1706299.1706326.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nanevski, Aleksandar, Viktor Vafeiadis, and Josh Berdine. "Structuring the verification of heap-manipulating programs." In the 37th annual ACM SIGPLAN-SIGACT symposium. ACM Press, 2010. http://dx.doi.org/10.1145/1706299.1706331.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Malik, Viktor, Martin Hruska, Peter Schrammel, and Tomas Vojnar. "Template-Based Verification of Heap-Manipulating Programs." In 2018 Formal Methods in Computer Aided Design (FMCAD). IEEE, 2018. http://dx.doi.org/10.23919/fmcad.2018.8603009.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dong, Longming, Ji Wang, and Liqian Chen. "Modular Heap Abstraction-Based Code Clone Detection for Heap-Manipulating Programs." In 2012 12th International Conference on Quality Software (QSIC 2012). IEEE, 2012. http://dx.doi.org/10.1109/qsic.2012.37.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Dong, Longming, Ji Wang, and Liqian Chen. "Modular Heap Abstraction-Based Memory Leak Detection for Heap-Manipulating Programs." In 2012 19th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2012. http://dx.doi.org/10.1109/apsec.2012.35.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jančík, Pavel, and Jan Kofroň. "Dead variable analysis for multi-threaded heap manipulating programs." In SAC 2016: Symposium on Applied Computing. ACM, 2016. http://dx.doi.org/10.1145/2851613.2851826.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Dillig, Isil, Thomas Dillig, Alex Aiken, and Mooly Sagiv. "Precise and compact modular procedure summaries for heap manipulating programs." In the 32nd ACM SIGPLAN conference. ACM Press, 2011. http://dx.doi.org/10.1145/1993498.1993565.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!