Journal articles on the topic 'Pointer Analysi'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Pointer Analysi.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shields, Denis C., Andrew Collins, and Angela Marlow. "Coding of pointers in the segregation analysis program POINTER." Genetic Epidemiology 11, no. 4 (1994): 385–87. http://dx.doi.org/10.1002/gepi.1370110408.
Full textMatsumoto, Aki, D. S. Han, and Takao Tsuda. "Alias analysis of pointers in Pascal and Fortran 90: dependence analysis between pointer references." Acta Informatica 33, no. 2 (March 1996): 99–130. http://dx.doi.org/10.1007/s002360050037.
Full textSmaragdakis, Yannis, and George Balatsouras. "Pointer Analysis." Foundations and Trends® in Programming Languages 2, no. 1 (2015): 1–69. http://dx.doi.org/10.1561/2500000014.
Full textHirzel, Martin, Daniel Von Dincklage, Amer Diwan, and Michael Hind. "Fast online pointer analysis." ACM Transactions on Programming Languages and Systems 29, no. 2 (April 2007): 11. http://dx.doi.org/10.1145/1216374.1216379.
Full textZhu, Jianwen, and Silvian Calman. "Symbolic pointer analysis revisited." ACM SIGPLAN Notices 39, no. 6 (June 9, 2004): 145–57. http://dx.doi.org/10.1145/996893.996860.
Full textPeng-Sheng Chen, Yuan-Shin Hwang, R. D. C. Ju, and J. K. Lee. "Interprocedural probabilistic pointer analysis." IEEE Transactions on Parallel and Distributed Systems 15, no. 10 (October 2004): 893–907. http://dx.doi.org/10.1109/tpds.2004.56.
Full textSpoto, Fausto. "Precise null-pointer analysis." Software & Systems Modeling 10, no. 2 (October 2, 2009): 219–52. http://dx.doi.org/10.1007/s10270-009-0132-5.
Full textHeintze, Nevin, and Olivier Tardieu. "Demand-driven pointer analysis." ACM SIGPLAN Notices 36, no. 5 (May 2001): 24–34. http://dx.doi.org/10.1145/381694.378802.
Full textHind, Michael, Michael Burke, Paul Carini, and Jong-Deok Choi. "Interprocedural pointer alias analysis." ACM Transactions on Programming Languages and Systems 21, no. 4 (July 1999): 848–94. http://dx.doi.org/10.1145/325478.325519.
Full textWang, Shao-Chung, Lin-Ya Yu, Li-An Her, Yuan-Shin Hwang, and Jenq-Kuen Lee. "Pointer-Based Divergence Analysis for OpenCL 2.0 Programs." ACM Transactions on Parallel Computing 8, no. 4 (December 31, 2021): 1–23. http://dx.doi.org/10.1145/3470644.
Full textPetri, Aspasia, and Efthymios Karabetsos. "Extreme output power emitted by commercial laser pointers in Greece: A solely local or a global issue?" Journal of Laser Applications 34, no. 2 (May 2022): 022025. http://dx.doi.org/10.2351/7.0000664.
Full textThiessen, Rei, and Ondřej Lhoták. "Context transformations for pointer analysis." ACM SIGPLAN Notices 52, no. 6 (September 14, 2017): 263–77. http://dx.doi.org/10.1145/3140587.3062359.
Full textRugina, Radu, and Martin Rinard. "Pointer analysis for multithreaded programs." ACM SIGPLAN Notices 34, no. 5 (May 1999): 77–90. http://dx.doi.org/10.1145/301631.301645.
Full textJianwen Zhu and S. Calman. "Context sensitive symbolic pointer analysis." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 24, no. 4 (April 2005): 516–31. http://dx.doi.org/10.1109/tcad.2005.844092.
Full textHorwitz, S., P. Pfeiffer, and T. Reps. "Dependence analysis for pointer variables." ACM SIGPLAN Notices 24, no. 7 (July 1989): 28–40. http://dx.doi.org/10.1145/74818.74821.
Full textBrauer, Jörg, Ralf Huuck, and Bastian Schlich. "Interprocedural Pointer Analysis in Goanna." Electronic Notes in Theoretical Computer Science 254 (October 2009): 65–83. http://dx.doi.org/10.1016/j.entcs.2009.09.060.
Full textVivien, Frédéric, and Martin Rinard. "Incrementalized pointer and escape analysis." ACM SIGPLAN Notices 36, no. 5 (May 2001): 35–46. http://dx.doi.org/10.1145/381694.378804.
Full textMachiry, Aravind, John Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, and Michael Hicks. "C to checked C by 3c." Proceedings of the ACM on Programming Languages 6, OOPSLA1 (December 8, 2022): 1–29. http://dx.doi.org/10.1145/3527322.
Full textHind, Michael, and Anthony Pioli. "Which pointer analysis should I use?" ACM SIGSOFT Software Engineering Notes 25, no. 5 (September 2000): 113–23. http://dx.doi.org/10.1145/347636.348916.
Full textHardekopf, Ben, and Calvin Lin. "Semi-sparse flow-sensitive pointer analysis." ACM SIGPLAN Notices 44, no. 1 (January 21, 2009): 226–38. http://dx.doi.org/10.1145/1594834.1480911.
Full textRugina, Radu, and Martin C. Rinard. "Pointer analysis for structured parallel programs." ACM Transactions on Programming Languages and Systems 25, no. 1 (January 2003): 70–116. http://dx.doi.org/10.1145/596980.596982.
Full textLiu, Bozhen, Jeff Huang, and Lawrence Rauchwerger. "Rethinking Incremental and Parallel Pointer Analysis." ACM Transactions on Programming Languages and Systems 41, no. 1 (March 2019): 1–31. http://dx.doi.org/10.1145/3293606.
Full textÇEZİKTÜRK, Özlem. "CONTENT ANALYSIS OF STUDENTS' CONSTRUCTIONS OF EIGHT POINTED, TEN POINTED, AND TWELVE POINTED STARS." Journal of Academic Social Sciences 75, no. 75 (January 1, 2018): 244–54. http://dx.doi.org/10.16992/asos.13978.
Full textAbdulhadi, Zayid, and Walter Hengartner. "One Pointed Univalent Logharmonic Mappings." Journal of Mathematical Analysis and Applications 203, no. 2 (October 1996): 333–51. http://dx.doi.org/10.1006/jmaa.1996.0383.
Full textLi, Yue, Tian Tan, Anders Møller, and Yannis Smaragdakis. "Precision-guided context sensitivity for pointer analysis." Proceedings of the ACM on Programming Languages 2, OOPSLA (October 24, 2018): 1–29. http://dx.doi.org/10.1145/3276511.
Full textZhang, Sean, Barbara G. Ryder, and William A. Landi. "Experiments with combined analysis for pointer aliasing." ACM SIGPLAN Notices 33, no. 7 (July 1998): 11–18. http://dx.doi.org/10.1145/277633.277635.
Full textPearce, David J., Paul H. J. Kelly, and Chris Hankin. "Efficient field-sensitive pointer analysis of C." ACM Transactions on Programming Languages and Systems 30, no. 1 (November 2007): 4. http://dx.doi.org/10.1145/1290520.1290524.
Full textSalcianu, Alexandru, and Martin Rinard. "Pointer and escape analysis for multithreaded programs." ACM SIGPLAN Notices 36, no. 7 (July 2001): 12–23. http://dx.doi.org/10.1145/568014.379553.
Full textGuyer, Samuel Z., and Calvin Lin. "Error checking with client-driven pointer analysis." Science of Computer Programming 58, no. 1-2 (October 2005): 83–114. http://dx.doi.org/10.1016/j.scico.2005.02.005.
Full textScholz, Berhard, Johann Blieberger, and Thomas Fahringer. "Symbolic pointer analysis for detecting memory leaks." ACM SIGPLAN Notices 34, no. 11 (November 1999): 104–13. http://dx.doi.org/10.1145/328691.328704.
Full textDas, Manuvir. "Unification-based pointer analysis with directional assignments." ACM SIGPLAN Notices 35, no. 5 (May 2000): 35–46. http://dx.doi.org/10.1145/358438.349309.
Full textCheng, Ben-Chung, and Wen-Mei W. Hwu. "Modular interprocedural pointer analysis using access paths." ACM SIGPLAN Notices 35, no. 5 (May 2000): 57–69. http://dx.doi.org/10.1145/358438.349311.
Full textDa Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGOPS Operating Systems Review 40, no. 5 (October 20, 2006): 416–25. http://dx.doi.org/10.1145/1168917.1168908.
Full textDa Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGPLAN Notices 41, no. 11 (November 2006): 416–25. http://dx.doi.org/10.1145/1168918.1168908.
Full textDa Silva, Jeff, and J. Gregory Steffan. "A probabilistic pointer analysis for speculative optimizations." ACM SIGARCH Computer Architecture News 34, no. 5 (October 20, 2006): 416–25. http://dx.doi.org/10.1145/1168919.1168908.
Full textLyde, Steven, William E. Byrd, and Matthew Might. "Control-flow analysis of dynamic languages via pointer analysis." ACM SIGPLAN Notices 51, no. 2 (May 11, 2016): 54–62. http://dx.doi.org/10.1145/2936313.2816712.
Full textEl Abbadi, Nidhal. "New Algorithm for Text in Text Steganography." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 26, 2021): 99–112. http://dx.doi.org/10.55562/jrucs.v23i2.483.
Full textLiu, Xia, Ming Lei, Hu Wei Liu, Yin Cao, and Xiao Hong Gao. "Risk Analysis of Quality and Safety for Laser Pointer with Remote Control." Advanced Materials Research 968 (June 2014): 263–66. http://dx.doi.org/10.4028/www.scientific.net/amr.968.263.
Full textChase, David, Mark Wegman, and F. Ken Zadeck. "Analysis of pointers and structures." ACM SIGPLAN Notices 39, no. 4 (April 2004): 343–59. http://dx.doi.org/10.1145/989393.989429.
Full textChase, David R., Mark Wegman, and F. Kenneth Zadeck. "Analysis of pointers and structures." ACM SIGPLAN Notices 25, no. 6 (June 1990): 296–310. http://dx.doi.org/10.1145/93548.93585.
Full textJunjie Wang, Xiaohong Li, Bobo Yan, and Zhiyong Feng. "Pointer Analysis Based Vulnerability Detection for Browser Extension." International Journal of Digital Content Technology and its Applications 6, no. 1 (January 31, 2012): 488–95. http://dx.doi.org/10.4156/jdcta.vol6.issue1.59.
Full textWhaley, John, and Martin Rinard. "Compositional pointer and escape analysis for Java programs." ACM SIGPLAN Notices 34, no. 10 (October 1999): 187–206. http://dx.doi.org/10.1145/320385.320400.
Full textYong, Suan Hsi, Susan Horwitz, and Thomas Reps. "Pointer analysis for programs with structures and casting." ACM SIGPLAN Notices 34, no. 5 (May 1999): 91–103. http://dx.doi.org/10.1145/301631.301647.
Full textLandi, William, Barbara G. Ryder, and Sean Zhang. "Interprocedural modification side effect analysis with pointer aliasing." ACM SIGPLAN Notices 28, no. 6 (June 1993): 56–67. http://dx.doi.org/10.1145/173262.155096.
Full textSui, Yulei, Xiaokang Fan, Hao Zhou, and Jingling Xue. "Loop-Oriented Pointer Analysis for Automatic SIMD Vectorization." ACM Transactions on Embedded Computing Systems 17, no. 2 (April 26, 2018): 1–31. http://dx.doi.org/10.1145/3168364.
Full textVenet, A. "Automatic analysis of pointer aliasing for untyped programs." Science of Computer Programming 35, no. 2-3 (November 1999): 223–48. http://dx.doi.org/10.1016/s0167-6423(99)00012-x.
Full textHuang, Bo, Binyu Zang, Jing Li, and Chuanqi Zhu. "A new approach to pointer analysis for assignments." Journal of Computer Science and Technology 16, no. 3 (May 2001): 242–50. http://dx.doi.org/10.1007/bf02943202.
Full textWilson, Robert P., and Monica S. Lam. "Efficient context-sensitive pointer analysis for C programs." ACM SIGPLAN Notices 30, no. 6 (June 1995): 1–12. http://dx.doi.org/10.1145/223428.207111.
Full textEllyana, Rossy Lydia, and I. Wayan Angga Wijaya Kusuma. "Penentuan Indeks Bias Kaca Berdasarkan Pola Interferensi Cahaya Laser Terhambur Menggunakan Cermin Datar “Berdebu”." Jurnal Teori dan Aplikasi Fisika 7, no. 2 (July 31, 2019): 169–78. http://dx.doi.org/10.23960/jtaf.v7i2.2150.
Full textLi, Yajun. "Ruled surfaces generated by Risley prism pointers: I. Pointing accuracy evaluation and enhancement based on a structural analysis of the scan field inside the pointer." Journal of the Optical Society of America A 38, no. 12 (November 29, 2021): 1884. http://dx.doi.org/10.1364/josaa.435621.
Full text