Articles de revues sur le sujet « Pointer Analysi »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Pointer Analysi.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Pointer Analysi ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Shields, Denis C., Andrew Collins et Angela Marlow. « Coding of pointers in the segregation analysis program POINTER ». Genetic Epidemiology 11, no 4 (1994) : 385–87. http://dx.doi.org/10.1002/gepi.1370110408.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Matsumoto, Aki, D. S. Han et Takao Tsuda. « Alias analysis of pointers in Pascal and Fortran 90 : dependence analysis between pointer references ». Acta Informatica 33, no 2 (mars 1996) : 99–130. http://dx.doi.org/10.1007/s002360050037.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Smaragdakis, Yannis, et George Balatsouras. « Pointer Analysis ». Foundations and Trends® in Programming Languages 2, no 1 (2015) : 1–69. http://dx.doi.org/10.1561/2500000014.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Hirzel, Martin, Daniel Von Dincklage, Amer Diwan et Michael Hind. « Fast online pointer analysis ». ACM Transactions on Programming Languages and Systems 29, no 2 (avril 2007) : 11. http://dx.doi.org/10.1145/1216374.1216379.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Zhu, Jianwen, et Silvian Calman. « Symbolic pointer analysis revisited ». ACM SIGPLAN Notices 39, no 6 (9 juin 2004) : 145–57. http://dx.doi.org/10.1145/996893.996860.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Peng-Sheng Chen, Yuan-Shin Hwang, R. D. C. Ju et J. K. Lee. « Interprocedural probabilistic pointer analysis ». IEEE Transactions on Parallel and Distributed Systems 15, no 10 (octobre 2004) : 893–907. http://dx.doi.org/10.1109/tpds.2004.56.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Spoto, Fausto. « Precise null-pointer analysis ». Software & ; Systems Modeling 10, no 2 (2 octobre 2009) : 219–52. http://dx.doi.org/10.1007/s10270-009-0132-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Heintze, Nevin, et Olivier Tardieu. « Demand-driven pointer analysis ». ACM SIGPLAN Notices 36, no 5 (mai 2001) : 24–34. http://dx.doi.org/10.1145/381694.378802.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Hind, Michael, Michael Burke, Paul Carini et Jong-Deok Choi. « Interprocedural pointer alias analysis ». ACM Transactions on Programming Languages and Systems 21, no 4 (juillet 1999) : 848–94. http://dx.doi.org/10.1145/325478.325519.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Wang, Shao-Chung, Lin-Ya Yu, Li-An Her, Yuan-Shin Hwang et Jenq-Kuen Lee. « Pointer-Based Divergence Analysis for OpenCL 2.0 Programs ». ACM Transactions on Parallel Computing 8, no 4 (31 décembre 2021) : 1–23. http://dx.doi.org/10.1145/3470644.

Texte intégral
Résumé :
A modern GPU is designed with many large thread groups to achieve a high throughput and performance. Within these groups, the threads are grouped into fixed-size SIMD batches in which the same instruction is applied to vectors of data in a lockstep. This GPU architecture is suitable for applications with a high degree of data parallelism, but its performance degrades seriously when divergence occurs. Many optimizations for divergence have been proposed, and they vary with the divergence information about variables and branches. A previous analysis scheme viewed pointers and return values from functions as divergence directly, and only focused on OpenCL 1.x. In this article, we present a novel scheme that reports the divergence information for pointer-intensive OpenCL programs. The approach is based on extended static single assignment (SSA) and adds some special functions and annotations from memory SSA and gated SSA. The proposed scheme first constructs extended SSA, which is then used to build a divergence relation graph that includes all of the possible points-to relationships of the pointers and initialized divergence states. The divergence state of the pointers can be determined by propagating the divergence state of the divergence relation graph. The scheme is further extended for interprocedural cases by considering function-related statements. The proposed scheme was implemented in an LLVM compiler and can be applied to OpenCL programs. We analyzed 10 programs with 24 kernels, with a total analyzed program size of 1,306 instructions in an LLVM intermediate representation, with 885 variables, 108 branches, and 313 pointer-related statements. The total number of divergent pointers detected was 146 for the proposed scheme, 200 for the scheme in which the pointer was always divergent, and 155 for the current LLVM default scheme; the total numbers of divergent variables detected were 458, 519, and 482, respectively, with 31, 34, and 32 divergent branches. These experimental results indicate that the proposed scheme is more precise than both a scheme in which a pointer is always divergent and the current LLVM default scheme.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Petri, Aspasia, et Efthymios Karabetsos. « Extreme output power emitted by commercial laser pointers in Greece : A solely local or a global issue ? » Journal of Laser Applications 34, no 2 (mai 2022) : 022025. http://dx.doi.org/10.2351/7.0000664.

Texte intégral
Résumé :
Although several countries have enacted legislation that prohibits the commercial distribution of laser pointers, high-power laser pointers are abundantly available on the market. The Greek Atomic Energy Commission (EEAE) investigated the compliance of laser pointers with the laser radiation safety limits in order to apply risk management actions in Greece. Compliance was assessed based on the laser pointer labeled data and in-house optical measurements. Laser pointers were purchased randomly from domestic physical marketplaces. Output power measurements revealed the risk of overexposure compared to the lasers' radiation safety limit values. Measured values also exceeded the output power values claimed on the laser pointer labels; hence, they may pose an unexpected more severe hazard than stated. Spectral analysis revealed an additional emission wavelength by the green laser pointers. All the inspected laser pointers declared “compliance with 21 CFR” and were labeled according to the U.S. 21 CFR 1040.1, although all consumer products available on the Greek market should comply with the relevant EU Directives, harmonized standards, and national legislation. These local findings adhere to a global issue—the unambiguous exposure of nonexpert users to high-power laser pointers that should not be commercially available. Overexposure to laser pointer radiation suppresses national borders as markets are not locally constrained, and laser technology continues to advance. The introduction of a universal laser safety language and a universal regulatory framework for laser pointers might facilitate product safety, international trade, and users' safety. EEAE runs social media campaigns to raise public awareness of laser pointer risks, using specifically designed infographics.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Thiessen, Rei, et Ondřej Lhoták. « Context transformations for pointer analysis ». ACM SIGPLAN Notices 52, no 6 (14 septembre 2017) : 263–77. http://dx.doi.org/10.1145/3140587.3062359.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Rugina, Radu, et Martin Rinard. « Pointer analysis for multithreaded programs ». ACM SIGPLAN Notices 34, no 5 (mai 1999) : 77–90. http://dx.doi.org/10.1145/301631.301645.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Jianwen Zhu et S. Calman. « Context sensitive symbolic pointer analysis ». IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 24, no 4 (avril 2005) : 516–31. http://dx.doi.org/10.1109/tcad.2005.844092.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Horwitz, S., P. Pfeiffer et T. Reps. « Dependence analysis for pointer variables ». ACM SIGPLAN Notices 24, no 7 (juillet 1989) : 28–40. http://dx.doi.org/10.1145/74818.74821.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Brauer, Jörg, Ralf Huuck et Bastian Schlich. « Interprocedural Pointer Analysis in Goanna ». Electronic Notes in Theoretical Computer Science 254 (octobre 2009) : 65–83. http://dx.doi.org/10.1016/j.entcs.2009.09.060.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Vivien, Frédéric, et Martin Rinard. « Incrementalized pointer and escape analysis ». ACM SIGPLAN Notices 36, no 5 (mai 2001) : 35–46. http://dx.doi.org/10.1145/381694.378804.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Machiry, Aravind, John Kastner, Matt McCutchen, Aaron Eline, Kyle Headley et Michael Hicks. « C to checked C by 3c ». Proceedings of the ACM on Programming Languages 6, OOPSLA1 (8 décembre 2022) : 1–29. http://dx.doi.org/10.1145/3527322.

Texte intégral
Résumé :
Owing to the continued use of C (and C++), spatial safety violations (e.g., buffer overflows) still constitute one of today's most dangerous and prevalent security vulnerabilities. To combat these violations, Checked C extends C with bounds-enforced checked pointer types. Checked C is essentially a gradually typed spatially safe C - checked pointers are backwards-binary compatible with legacy pointers, and the language allows them to be added piecemeal, rather than necessarily all at once, so that safety retrofitting can be incremental. This paper presents a semi-automated process for porting a legacy C program to Checked C. The process centers on 3C, a static analysis-based annotation tool. 3C employs two novel static analysis algorithms - typ3c and boun3c - to annotate legacy pointers as checked pointers, and to infer array bounds annotations for pointers that need them. 3C performs a root cause analysis to direct a human developer to code that should be refactored; once done, 3C can be re-run to infer further annotations (and updated root causes). Experiments on 11 programs totaling 319KLoC show 3C to be effective at inferring checked pointer types, and experience with previously and newly ported code finds 3C works well when combined with human-driven refactoring.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Hind, Michael, et Anthony Pioli. « Which pointer analysis should I use ? » ACM SIGSOFT Software Engineering Notes 25, no 5 (septembre 2000) : 113–23. http://dx.doi.org/10.1145/347636.348916.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Hardekopf, Ben, et Calvin Lin. « Semi-sparse flow-sensitive pointer analysis ». ACM SIGPLAN Notices 44, no 1 (21 janvier 2009) : 226–38. http://dx.doi.org/10.1145/1594834.1480911.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Rugina, Radu, et Martin C. Rinard. « Pointer analysis for structured parallel programs ». ACM Transactions on Programming Languages and Systems 25, no 1 (janvier 2003) : 70–116. http://dx.doi.org/10.1145/596980.596982.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Liu, Bozhen, Jeff Huang et Lawrence Rauchwerger. « Rethinking Incremental and Parallel Pointer Analysis ». ACM Transactions on Programming Languages and Systems 41, no 1 (mars 2019) : 1–31. http://dx.doi.org/10.1145/3293606.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

ÇEZİKTÜRK, Özlem. « CONTENT ANALYSIS OF STUDENTS' CONSTRUCTIONS OF EIGHT POINTED, TEN POINTED, AND TWELVE POINTED STARS ». Journal of Academic Social Sciences 75, no 75 (1 janvier 2018) : 244–54. http://dx.doi.org/10.16992/asos.13978.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Abdulhadi, Zayid, et Walter Hengartner. « One Pointed Univalent Logharmonic Mappings ». Journal of Mathematical Analysis and Applications 203, no 2 (octobre 1996) : 333–51. http://dx.doi.org/10.1006/jmaa.1996.0383.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Li, Yue, Tian Tan, Anders Møller et Yannis Smaragdakis. « Precision-guided context sensitivity for pointer analysis ». Proceedings of the ACM on Programming Languages 2, OOPSLA (24 octobre 2018) : 1–29. http://dx.doi.org/10.1145/3276511.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Zhang, Sean, Barbara G. Ryder et William A. Landi. « Experiments with combined analysis for pointer aliasing ». ACM SIGPLAN Notices 33, no 7 (juillet 1998) : 11–18. http://dx.doi.org/10.1145/277633.277635.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Pearce, David J., Paul H. J. Kelly et Chris Hankin. « Efficient field-sensitive pointer analysis of C ». ACM Transactions on Programming Languages and Systems 30, no 1 (novembre 2007) : 4. http://dx.doi.org/10.1145/1290520.1290524.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Salcianu, Alexandru, et Martin Rinard. « Pointer and escape analysis for multithreaded programs ». ACM SIGPLAN Notices 36, no 7 (juillet 2001) : 12–23. http://dx.doi.org/10.1145/568014.379553.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Guyer, Samuel Z., et Calvin Lin. « Error checking with client-driven pointer analysis ». Science of Computer Programming 58, no 1-2 (octobre 2005) : 83–114. http://dx.doi.org/10.1016/j.scico.2005.02.005.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Scholz, Berhard, Johann Blieberger et Thomas Fahringer. « Symbolic pointer analysis for detecting memory leaks ». ACM SIGPLAN Notices 34, no 11 (novembre 1999) : 104–13. http://dx.doi.org/10.1145/328691.328704.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Das, Manuvir. « Unification-based pointer analysis with directional assignments ». ACM SIGPLAN Notices 35, no 5 (mai 2000) : 35–46. http://dx.doi.org/10.1145/358438.349309.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Cheng, Ben-Chung, et Wen-Mei W. Hwu. « Modular interprocedural pointer analysis using access paths ». ACM SIGPLAN Notices 35, no 5 (mai 2000) : 57–69. http://dx.doi.org/10.1145/358438.349311.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Da Silva, Jeff, et J. Gregory Steffan. « A probabilistic pointer analysis for speculative optimizations ». ACM SIGOPS Operating Systems Review 40, no 5 (20 octobre 2006) : 416–25. http://dx.doi.org/10.1145/1168917.1168908.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Da Silva, Jeff, et J. Gregory Steffan. « A probabilistic pointer analysis for speculative optimizations ». ACM SIGPLAN Notices 41, no 11 (novembre 2006) : 416–25. http://dx.doi.org/10.1145/1168918.1168908.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Da Silva, Jeff, et J. Gregory Steffan. « A probabilistic pointer analysis for speculative optimizations ». ACM SIGARCH Computer Architecture News 34, no 5 (20 octobre 2006) : 416–25. http://dx.doi.org/10.1145/1168919.1168908.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Lyde, Steven, William E. Byrd et Matthew Might. « Control-flow analysis of dynamic languages via pointer analysis ». ACM SIGPLAN Notices 51, no 2 (11 mai 2016) : 54–62. http://dx.doi.org/10.1145/2936313.2816712.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

El Abbadi, Nidhal. « New Algorithm for Text in Text Steganography ». Journal of Al-Rafidain University College For Sciences ( Print ISSN : 1681-6870 ,Online ISSN : 2790-2293 ), no 2 (26 octobre 2021) : 99–112. http://dx.doi.org/10.55562/jrucs.v23i2.483.

Texte intégral
Résumé :
Steganography is a technique to hide secret information in some other data (we call it a cover) without leaving any apparent evidence of data alteration. All of the traditional steganographic techniques have limited information- hiding capacity. They can hide only 10% (or less) of the data amounts of the cover. While much of the recent research in steganography has been on hiding data in images, many of the solutions that for images are more complicated when applied to natural language text as a cover medium. Many approaches to steganalysis attempt to detect statistical anomalies in cover data which predict the presence of hidden information. Natural language cover texts must not only pass the statistical muster of automatic analysis, but also the minds of human readers. This paper present a new algorithm to hide a large amount of text in cover text without effecting the cover, by using many types of pointers ( which are characters can interpreter as invisible character, or as apart of cover. Pointers used as single pointer or set of pointer to represent new single pointer. In this algorithm we can hide more than 40% of the data amounts of the cover.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Liu, Xia, Ming Lei, Hu Wei Liu, Yin Cao et Xiao Hong Gao. « Risk Analysis of Quality and Safety for Laser Pointer with Remote Control ». Advanced Materials Research 968 (juin 2014) : 263–66. http://dx.doi.org/10.4028/www.scientific.net/amr.968.263.

Texte intégral
Résumé :
Multimedia teaching and lecturing have been widely used nowadays, and then the technology of laser pointer with remote control appears in order to satisfy the requirements. The radiation power of some laser pointers is large, which may be lead to impaired eyes due to improper use. The hazard of laser radiation was analyzed. The standards, laws and regulations of the domestic and foreign were compared. Some suggestions and measures of perfecting the relative standards, strengthening consumers' education and industry rectification were provided.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Chase, David, Mark Wegman et F. Ken Zadeck. « Analysis of pointers and structures ». ACM SIGPLAN Notices 39, no 4 (avril 2004) : 343–59. http://dx.doi.org/10.1145/989393.989429.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Chase, David R., Mark Wegman et F. Kenneth Zadeck. « Analysis of pointers and structures ». ACM SIGPLAN Notices 25, no 6 (juin 1990) : 296–310. http://dx.doi.org/10.1145/93548.93585.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Junjie Wang, Xiaohong Li, Bobo Yan et Zhiyong Feng. « Pointer Analysis Based Vulnerability Detection for Browser Extension ». International Journal of Digital Content Technology and its Applications 6, no 1 (31 janvier 2012) : 488–95. http://dx.doi.org/10.4156/jdcta.vol6.issue1.59.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Whaley, John, et Martin Rinard. « Compositional pointer and escape analysis for Java programs ». ACM SIGPLAN Notices 34, no 10 (octobre 1999) : 187–206. http://dx.doi.org/10.1145/320385.320400.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Yong, Suan Hsi, Susan Horwitz et Thomas Reps. « Pointer analysis for programs with structures and casting ». ACM SIGPLAN Notices 34, no 5 (mai 1999) : 91–103. http://dx.doi.org/10.1145/301631.301647.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Landi, William, Barbara G. Ryder et Sean Zhang. « Interprocedural modification side effect analysis with pointer aliasing ». ACM SIGPLAN Notices 28, no 6 (juin 1993) : 56–67. http://dx.doi.org/10.1145/173262.155096.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Sui, Yulei, Xiaokang Fan, Hao Zhou et Jingling Xue. « Loop-Oriented Pointer Analysis for Automatic SIMD Vectorization ». ACM Transactions on Embedded Computing Systems 17, no 2 (26 avril 2018) : 1–31. http://dx.doi.org/10.1145/3168364.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
46

Venet, A. « Automatic analysis of pointer aliasing for untyped programs ». Science of Computer Programming 35, no 2-3 (novembre 1999) : 223–48. http://dx.doi.org/10.1016/s0167-6423(99)00012-x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
47

Huang, Bo, Binyu Zang, Jing Li et Chuanqi Zhu. « A new approach to pointer analysis for assignments ». Journal of Computer Science and Technology 16, no 3 (mai 2001) : 242–50. http://dx.doi.org/10.1007/bf02943202.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
48

Wilson, Robert P., et Monica S. Lam. « Efficient context-sensitive pointer analysis for C programs ». ACM SIGPLAN Notices 30, no 6 (juin 1995) : 1–12. http://dx.doi.org/10.1145/223428.207111.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Ellyana, Rossy Lydia, et I. Wayan Angga Wijaya Kusuma. « Penentuan Indeks Bias Kaca Berdasarkan Pola Interferensi Cahaya Laser Terhambur Menggunakan Cermin Datar “Berdebu” ». Jurnal Teori dan Aplikasi Fisika 7, no 2 (31 juillet 2019) : 169–78. http://dx.doi.org/10.23960/jtaf.v7i2.2150.

Texte intégral
Résumé :
Experiment on Interference Pattern of Laser Light Scattered Analysis using a "Dusty" Plane Mirror aims to determine the glass refractive index value. The dust samples used in this experiment are baby powder, chalk, rice flour, wood powder and beauty powder. The dust samples sprinkled over a clean mirror, so it will produce an interference pattern that can be seen on the screen. The results of the interference pattern are circular because the screen is perforated with a diameter of 0.01 m. Dust particle sample variation only affects the brightness level of interference patterns. Analysis of interference patterns using red laser pointers or green laser pointers will get the brightest interference patterns when using baby powder compared to other dust samples. Based on the resulting interference pattern, the refractive index value of the glass using a red laser pointer is 1.62 ± 0.04 and the weighted average value of the glass refractive index is 1.68 ± 0.02, whereas the refractive index value of glass using a green laser pointer is 1.74 ± 0.07 and the weighted average value of the refractive index of the glass is 1.79 ± 0.02
Styles APA, Harvard, Vancouver, ISO, etc.
50

Li, Yajun. « Ruled surfaces generated by Risley prism pointers : I. Pointing accuracy evaluation and enhancement based on a structural analysis of the scan field inside the pointer ». Journal of the Optical Society of America A 38, no 12 (29 novembre 2021) : 1884. http://dx.doi.org/10.1364/josaa.435621.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie