Tag #pointer
222 papers:
- POPL-2020-MeyerW #data type #lifecycle #memory management
- Pointer life cycle types for lock-free data structures with memory reclamation (RM0, SW), p. 36.
- CC-2020-FegadeW #analysis #data type #modelling #scalability #semantics #using
- Scalable pointer analysis of data structures using semantic models (PF, CW), pp. 39–50.
- ICPC-2019-ZyrianovNGCM #analysis #framework #implementation #named
- srcPtr: a framework for implementing static pointer analysis approaches (VZ, CDN, DTG, MLC, JIM), pp. 144–147.
- FSCD-2019-Naurois #recursion
- Pointers in Recursion: Exploring the Tropics (PJdN), p. 18.
- OOPSLA-2019-LuX #analysis #context-sensitive grammar #performance
- Precision-preserving yet fast object-sensitive pointer analysis with partial context sensitivity (JL, JX), p. 29.
- POPL-2019-BatzKKMN #logic #probability #reasoning #source code
- Quantitative separation logic: a logic for reasoning about probabilistic pointer programs (KB, BLK, JPK, CM, TN0), p. 29.
- POPL-2019-MemarianGDKRWS #c #semantics
- Exploring C semantics and pointer provenance (KM, VBFG, BD, SK, AR, RNMW, PS), p. 32.
- SAS-2019-LeiS #analysis #performance #precise
- Fast and Precise Handling of Positive Weight Cycles for Field-Sensitive Pointer Analysis (YL, YS), pp. 27–47.
- ASE-2019-MaYLYZ #c++ #fault #named #source code #static analysis
- SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs (XM, JY, YL, JY0, JZ), pp. 1122–1125.
- ASE-2019-WangC00S #analysis #fault #memory management #named
- TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis (YW, GC, MZ0, MG0, JS), pp. 1170–1173.
- ICSE-2019-XuSYX #named #null #precise #program repair
- VFix: value-flow-guided precise program repair for null pointer dereferences (XX, YS, HY, JX), pp. 512–523.
- ASPLOS-2019-DavisWRNMBCCFGJ #c #named #runtime
- CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.
- ASPLOS-2019-WuSCL #using
- Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells (XCW, TS, FTC, YL), pp. 645–657.
- CASE-2019-LaiKPC #adaptation #novel #recognition
- A Novel Scale Recognition Method for Pointer Meters Adapted to Different Types and Shapes (HL, QK, LP, CC), pp. 374–379.
- VMCAI-2019-BouillaguetBSY #analysis #deduction #in memory #memory management #modelling #verification
- Exploiting Pointer Analysis in Memory Models for Deductive Verification (QB, FB, MS, BY), pp. 160–182.
- CIKM-2018-SunJSPOW #multi #network #summary
- Multi-Source Pointer Network for Product Title Summarization (FS, PJ, HS, CP, WO, XW), pp. 7–16.
- OOPSLA-2018-LiTMS #analysis #context-sensitive grammar
- Precision-guided context sensitivity for pointer analysis (YL0, TT0, AM, YS), p. 29.
- ESEC-FSE-2018-LiTMS #analysis #context-sensitive grammar #self
- Scalability-first pointer analysis with self-tuning context-sensitivity (YL0, TT0, AM, YS), pp. 129–140.
- ESOP-2018-SkorstengaardDB #reasoning #stack
- Reasoning About a Machine with Local Capabilities - Provably Safe Stack and Return Pointer Management (LS, DD, LB), pp. 475–501.
- CAV-2018-ArndtJKMN #exclamation #graph #java #source code #verification
- Let this Graph Be Your Witness! - An Attestor for Verifying Java Pointer Programs (HA, CJ, JPK, CM, TN0), pp. 3–11.
- SANER-2017-DurieuxCSM #exception #generative #metaprogramming #null #using
- Dynamic patch generation for null pointer exceptions using metaprogramming (TD, BC, LS, MM), pp. 349–358.
- KDD-2017-MottiniA #network #predict #using
- Deep Choice Model Using Pointer Networks for Airline Itinerary Prediction (AM, RAA), pp. 1575–1583.
- PLDI-2017-ThiessenL #analysis
- Context transformations for pointer analysis (RT, OL), pp. 263–277.
- ASE-2017-CoppaDD #execution #reasoning #symbolic computation
- Rethinking pointer reasoning in symbolic execution (EC, DCD, CD), pp. 613–618.
- CGO-2017-MaalejPRGP #ambiguity #strict
- Pointer disambiguation via strict inequalities (MM, VP, PR, LG, FMQP), pp. 134–147.
- CADE-2017-TellezB #automation #proving #source code #verification
- Automatically Verifying Temporal Properties of Pointer Programs with Cyclic Proof (GT, JB), pp. 491–508.
- EDM-2016-LambHUP
- Portrait of an Indexer - Computing Pointers Into Instructional Videos (AL, JH, JDU, AP), pp. 601–602.
- IFM-2016-Preoteasa #invariant #logic #programming #source code #using #verification
- Verifying Pointer Programs Using Separation Logic and Invariant Based Programming in Isabelle (VP), pp. 457–473.
- Haskell-2016-ChauhanKY #how
- How to twist pointers without breaking them (SC, PPK, BAY), pp. 51–61.
- ECOOP-2016-SpathDAB #analysis #java #named
- Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (JS, LNQD, KA0, EB), p. 26.
- OOPSLA-2016-AminT #java #null #scala #type system
- Java and scala's type systems are unsound: the existential crisis of null pointers (NA, RT), pp. 838–848.
- SAS-2016-TanLX #analysis #precise
- Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting (TT0, YL0, JX), pp. 489–510.
- CC-2016-DuckY #bound
- Heap bounds protection with low fat pointers (GJD, RHCY), pp. 132–142.
- CGO-2016-PaisanteMBGP #analysis
- Symbolic range analysis of pointers (VP, MM, LBeO, LG, FMQP), pp. 171–181.
- CGO-2016-SuiDX #analysis #parallel #source code #thread
- Sparse flow-sensitive pointer analysis for multithreaded programs (YS, PD, JX), pp. 160–170.
- VMCAI-2016-DudkaHPTV #low level
- From Low-Level Pointers to High-Level Containers (KD, LH, PP, MT, TV), pp. 431–452.
- VMCAI-2016-HazizaHMW
- Pointer Race Freedom (FH, LH, RM0, SW), pp. 393–412.
- ICEIS-v2-2015-AizebojeP #approach #using
- An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
- OOPSLA-2015-AlvesGDLGRP #ambiguity #runtime
- Runtime pointer disambiguation (PA, FG, JD, AL, TG, FR, FMQP), pp. 589–606.
- ESEC-FSE-2015-FuLB #analysis #automation #memory dump #memory management
- Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
- CGO-2015-NagarajG #analysis #approximate #mining #using
- Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
- ICGT-2014-JansenGN #execution #generative #induction #source code #symbolic computation
- Generating Inductive Predicates for Symbolic Execution of Pointer-Manipulating Programs (CJ, FG, TN), pp. 65–80.
- ICGT-2014-JansenN #generative #graph #source code #summary
- Generating Abstract Graph-Based Procedure Summaries for Pointer Programs (CJ, TN), pp. 49–64.
- PLDI-2014-XiaoZZZ #persistent
- Persistent pointer information (XX, QZ, JZ, CZ), p. 48.
- SAS-2014-MadsenM #analysis #data flow #reachability
- Sparse Dataflow Analysis with Pointers and Reachability (MM, AM), pp. 201–218.
- SAS-2014-YeSX #analysis
- Region-Based Selective Flow-Sensitive Pointer Analysis (SY, YS, JX), pp. 319–336.
- CGO-2014-NagarakatteMZ #named
- WatchdogLite: Hardware-Accelerated Compiler-Based Pointer Checking (SN, MMKM, SZ), p. 175.
- IJCAR-2014-StroderGBFFHS #memory management #proving #safety #source code #termination
- Proving Termination and Memory Safety for Programs with Pointer Arithmetic (TS, JG, MB, FF, CF, JH, PSK), pp. 208–223.
- DRR-2013-YouSADT13a #image #ontology #retrieval #robust #segmentation #towards #visual notation
- A robust pointer segmentation in biomedical images toward building a visual ontology for biomedical article retrieval (DY, MSS, SA, DDF, GRT).
- SCAM-2013-BiallasOCH #analysis #named
- PtrTracker: Pragmatic pointer analysis (SB, MCO, FC, RH), pp. 69–73.
- SEKE-2013-LiuWL #analysis #detection #named #online #performance
- ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
- ISMM-2013-LiCK #analysis #graph #precise #scalability
- Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
- FoSSaCS-2013-HofmannRS #morphism #source code
- Pure Pointer Programs and Tree Isomorphism (MH, RR, US), pp. 321–336.
- FM-2012-GiorginoS #algorithm #correctness
- Correctness of Pointer Manipulating Algorithms Illustrated by a Verified BDD Construction (MG, MS), pp. 202–216.
- CHI-2012-HenneckeMB #how #interactive
- How screen transitions influence touch and pointer interaction across angled display arrangements (FH, WM, AB), pp. 209–212.
- ECOOP-2012-DeD #analysis #java #scalability
- Scalable Flow-Sensitive Pointer Analysis for Java with Strong Updates (AD, DD), pp. 665–687.
- SAS-2012-KhedkerMR #analysis
- Liveness-Based Pointer Analysis (UPK, AM, PSR), pp. 265–282.
- IJCAR-2012-BoerBR #automation #recursion #source code #verification
- Automated Verification of Recursive Programs with Pointers (FSdB, MMB, JR), pp. 149–163.
- ISSTA-2012-CaballeroGMN #detection #named
- Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities (JC, GG, MM, AN), pp. 133–143.
- SEKE-2011-LiuL #analysis #parallel #petri net #thread
- Multithreaded Pointer Analysis Based on Petri Net (FL, BL), pp. 127–130.
- ASE-2011-MacleanIG #animation #correctness #functional #source code
- The CORE system: Animation and functional correctness of pointer programs (EM, AI, GG), pp. 588–591.
- CGO-2011-HardekopfL #analysis
- Flow-sensitive pointer analysis for millions of lines of code (BH, CL), pp. 289–298.
- ESOP-2011-SotinJ #analysis #interprocedural #precise #stack
- Precise Interprocedural Analysis in the Presence of Pointers to the Stack (PS, BJ), pp. 459–479.
- ICST-2011-RomanoPA #approach #exception #null #testing
- An Approach for Search Based Testing of Null Pointer Exceptions (DR, MDP, GA), pp. 160–169.
- ISSTA-2011-Rubio-GonzalezL #fault #interactive #kernel #linux
- Defective error/pointer interactions in the Linux kernel (CRG, BL), pp. 111–121.
- IFM-2010-DiosMP
- Certified Absence of Dangling Pointers in a Language with Explicit Deallocation (JdD, MM, RP), pp. 305–319.
- SAC-PL-J-2008-BussBSE10 #analysis #debugging #novel
- A novel analysis space for pointer analysis and its application for bug finding (MB, DB, VCS, SAE), pp. 921–942.
- CGO-2010-YuXHFZ #analysis #scalability
- Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code (HY, JX, WH, XF, ZZ), pp. 218–229.
- VMCAI-2010-Might #analysis
- Shape Analysis in the Absence of Pointers and Structure (MM), pp. 263–278.
- SEFM-2009-TatsutaCA #logic #verification
- Completeness of Pointer Program Verification by Separation Logic (MT, WNC, MFAA), pp. 179–188.
- POPL-2009-HardekopfL #analysis
- Semi-sparse flow-sensitive pointer analysis (BH, CL), pp. 226–238.
- SAS-2009-Simon #analysis #optimisation #similarity #using
- Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
- CGO-2009-PereiraB #analysis
- Wave Propagation and Deep Propagation for Pointer Analysis (FMQP, DB), pp. 126–135.
- TACAS-2009-VanoverbergheTP #generative #source code
- Test Input Generation for Programs with Pointers (DV, NT, FP), pp. 277–291.
- ISSTA-2009-ElkarabliehGL #generative #precise #reasoning #testing
- Precise pointer reasoning for dynamic test generation (BE, PG, MYL), pp. 129–140.
- LICS-2009-HofmannS #reachability #source code
- Pointer Programs and Undirected Reachability (MH, US), pp. 133–142.
- FM-2008-NollR #thread #verification
- Verifying Dynamic Pointer-Manipulating Threads (TN, SR), pp. 84–99.
- RTA-2008-EchahedP
- A Needed Rewriting Strategy for Data-Structures with Pointers (RE, NP), pp. 63–78.
- PLDI-2008-Kahlon #alias #analysis #named #scalability
- Bootstrapping: a technique for scalable flow and context-sensitive pointer alias analysis (VK), pp. 249–259.
- SAS-2008-ConwayDNB #analysis #fault #proving
- Pointer Analysis, Conditional Soundness, and Proving the Absence of Errors (CLC, DD, KSN, CB), pp. 62–77.
- SAS-2008-PrabhuS #analysis #array #java #using
- Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
- SAC-2008-BussBSE #analysis #flexibility #graph #using
- Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
- PDP-2008-NoguchiDB #migration #performance #process
- Efficient Global Pointers With Spontaneous Process Migration (KN, MBD, LB), pp. 87–94.
- CSL-2008-HofmannS #source code
- Pure Pointer Programs with Iteration (MH, US), pp. 79–93.
- PASTE-2007-HovemeyerP #debugging #null
- Finding more null pointer bugs, but not too many (DH, WP), pp. 9–14.
- RTA-2007-EchahedP #confluence #strict #term rewriting
- Non Strict Confluent Rewrite Systems for Data-Structures with Pointers (RE, NP), pp. 137–152.
- ICFP-2007-MarlowYJ #lazy evaluation #performance #using
- Faster laziness using dynamic pointer tagging (SM, ARY, SLPJ), pp. 277–288.
- HCI-IPT-2007-KimLLL #flexibility #interactive
- Vision Based Laser Pointer Interaction for Flexible Screens (NWK, SJL, BGL, JJL), pp. 845–853.
- ECOOP-2007-VenstermansEB #java #virtual machine
- Object-Relative Addressing: Compressed Pointers in 64-Bit Java Virtual Machines (KV, LE, KDB), pp. 79–100.
- PLDI-2007-HardekopfL #analysis #performance
- The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code (BH, CL), pp. 290–299.
- SAS-2007-HardekopfL #analysis #equivalence
- Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis (BH, CL), pp. 265–280.
- SAS-2007-KamilY #analysis #distributed #source code
- Hierarchical Pointer Analysis for Distributed Programs (AK, KAY), pp. 281–297.
- CC-2007-BakerCPV #garbage collection #lazy evaluation
- Accurate Garbage Collection in Uncooperative Environments with Lazy Pointer Stacks (JB, AC, FP, JV), pp. 64–79.
- DATE-2007-ParkPBBKD #architecture #embedded #performance
- Register pointer architecture for efficient embedded processors (JP, SBP, JDB, DBS, CK, WJD), pp. 600–605.
- FM-2006-Preoteasa #logic #recursion #using #verification
- Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic (VP), pp. 508–523.
- ICGT-2006-EchahedP
- Narrowing Data-Structures with Pointers (RE, NP), pp. 92–106.
- CHI-2006-JiangOMS #interactive #using
- Direct pointer: direct manipulation for large-display interaction using handheld cameras (HJ, EO, NM, YS), pp. 1107–1110.
- SOFTVIS-2006-HundhausenBF #algorithm #design #visualisation
- Adding procedures and pointers to the ALVIS algorithm visualization software: a preliminary design (CDH, JLB, SF), pp. 155–156.
- ICPR-v4-2006-SekoYSMK #metric
- Proposal of recordable pointer: Pointed position measurement by projecting interference concentric circle pattern with a pointing device (YS, YY, YS, JM, HK), pp. 825–828.
- POPL-2006-NiS #assembly #embedded #programming
- Certified assembly programming with embedded code pointers (ZN, ZS), pp. 320–333.
- POPL-2006-Thielecke
- Frame rules from answer types for code pointers (HT), pp. 309–319.
- SAS-2006-CalcagnoDOY #abstraction #reachability
- Beyond Reachability: Shape Abstraction in the Presence of Pointer Arithmetic (CC, DD, PWO, HY), pp. 182–203.
- ASPLOS-2006-SilvaS #analysis #optimisation #probability
- A probabilistic pointer analysis for speculative optimizations (JDS, JGS), pp. 416–425.
- CC-2006-TokGL #analysis #data flow #interprocedural #performance
- Efficient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers (TBT, SZG, CL), pp. 17–31.
- LCTES-2006-Mine #analysis #c #embedded #source code
- Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics (AM), pp. 54–63.
- ESOP-2006-JiaW #automation #named #reasoning #source code
- ILC: A Foundation for Automated Reasoning About Pointer Programs (LJ, DW), pp. 131–145.
- PASTE-2005-HovemeyerSP #debugging #null #static analysis
- Evaluating and tuning a static analysis to find null pointer bugs (DH, JS, WP), pp. 13–19.
- SCAM-2005-BussEYW #analysis #text-to-text
- Pointer Analysis for Source-to-Source Transformations (MB, SAE, BY, DGW), pp. 139–150.
- CHI-2005-PoFB #interactive
- Comparing cursor orientations for mouse, pointer, and pen interaction (BAP, BDF, KSB), pp. 291–300.
- PADL-2005-ZhuX #programming
- Safe Programming with Pointers Through Stateful Views (DZ, HX), pp. 83–97.
- ASE-2005-GotliebDB #constraints #generative #testing
- Constraint-based test data generation in the presence of stack-directed pointers (AG, TD, BB), pp. 313–316.
- ICSE-2005-AvotsDLL #analysis #c #security
- Improving software security with a C pointer analysis (DA, MD, VBL, MSL), pp. 332–341.
- CGO-2005-GuoBTORA #analysis #low level
- Practical and Accurate Low-Level Pointer Analysis (BG, MJB, ST, GO, ER, DIA), pp. 291–302.
- DAC-2005-Zhu #analysis #scalability #towards
- Towards scalable flow and context sensitive pointer analysis (JZ), pp. 831–836.
- ESOP-2005-LeeYY #analysis #automation #grammarware #source code #using #verification
- Automatic Verification of Pointer Programs Using Grammar-Based Shape Analysis (OL, HY, KY), pp. 124–140.
- CSL-2005-CharatonikGM #bound #model checking #source code
- Bounded Model Checking of Pointer Programs (WC, LG, PM), pp. 397–412.
- PASTE-2004-NystromKH #analysis
- Importance of heap specialization in pointer analysis (EMN, HSK, WmWH), pp. 43–48.
- PASTE-2004-PearceKH #analysis #c #performance
- Efficient field-sensitive pointer analysis for C (DJP, PHJK, CH), pp. 37–42.
- ECOOP-2004-HirzelDH #analysis
- Pointer Analysis in the Presence of Dynamic Class Loading (MH, AD, MH), pp. 96–122.
- PLDI-2004-WhaleyL #alias #analysis #diagrams #using
- Cloning-based context-sensitive pointer alias analysis using binary decision diagrams (JW, MSL), pp. 131–144.
- PLDI-2004-ZhuC #analysis #revisited
- Symbolic pointer analysis revisited (JZ, SC), pp. 145–157.
- SAS-2004-NystromKH #analysis #bottom-up #top-down
- Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis (EMN, HSK, WmWH), pp. 165–180.
- SAS-2004-Venet #analysis #embedded #scalability #source code
- A Scalable Nonuniform Pointer Analysis for Embedded Programs (AV), pp. 149–164.
- PDP-2004-AsenjoCGNPZ #optimisation #source code
- Optimization Techniques for Irregular and Pointer-Based Programs (RA, FC, EG, MAN, OGP, ELZ), p. 2–?.
- SCAM-2003-PearceKH #analysis #detection #difference #online
- Online Cycle Detection and Difference Propagation for Pointer Analysis (DJP, PHJK, CH), pp. 3–12.
- FME-2003-Abrial #development
- Event Based Sequential Program Development: Application to Constructing a Pointer Program (JRA), pp. 51–74.
- AGTIVE-2003-BakewellPR #graph #reduction #specification
- Specifying Pointer Structures by Graph Reduction (AB, DP, CR), pp. 30–44.
- SAS-2003-GuyerL #analysis
- Client-Driven Pointer Analysis (SZG, CL), pp. 214–236.
- ESEC-FSE-2003-LivshitsL #c #context-sensitive grammar #debugging #detection #source code
- Tracking pointers with path and context sensitivity for bug detection in C programs (VBL, MSL), pp. 317–326.
- ESEC-FSE-2003-YongH #c #source code
- Protecting C programs from attacks via invalid pointer dereferences (SHY, SH), pp. 307–316.
- SAC-2003-NandaR #analysis #java #parallel #source code #thread
- Pointer Analysis of Multithreaded Java Programs (MGN, SR), pp. 1068–1075.
- FASE-2003-Kubica #approach #specification #verification
- A Temporal Approach to Specification and Verification of Pointer Data-Structures (MK), pp. 231–245.
- CADE-2003-MehtaN #higher-order #logic #proving #source code
- Proving Pointer Programs in Higher-Order Logic (FM, TN), pp. 121–135.
- SCAM-2002-MilanovaRR #graph #precise
- Precise Call Graph Construction in the Presence of Function Pointers (AM, AR, BGR), pp. 155–162.
- CHI-2002-MyersBNPKML #distance #performance
- Interacting at a distance: measuring the performance of laser pointers and other devices (BAM, RB, JN, CHP, DK, RCM, ACL), pp. 33–40.
- SAS-2002-AdamsBDLRSW #analysis #data flow #using
- Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis (SA, TB, MD, SL, SKR, MS, WW), pp. 230–246.
- ASE-2002-VisvanathanG #generative #testing
- Generating Test Data for Functions with Pointer Inputs (SV, NG), p. 149–?.
- SAC-2002-Moreau #fault tolerance #mobile
- A fault-tolerant directory service for mobile agents based on forwarding pointers (LM), pp. 93–100.
- STOC-2002-BrodalLMTT
- Optimal finger search trees in the pointer machine (GSB, GL, CM, AKT, KT), pp. 583–591.
- ITiCSE-2001-Kumar #c++ #interactive #learning
- Learning the interaction between pointers and scope in C++ (ANK), pp. 45–48.
- IWPC-2001-OrsoSH #data flow #dependence
- Effects of Pointers on Data Dependences (AO, SS, MJH), pp. 39–49.
- PASTE-2001-Hind #analysis #problem #question
- Pointer analysis: haven’t we solved this problem yet? (MH), pp. 54–61.
- CHI-2001-OlsenN #interactive
- Laser pointer interaction (DRO, STN), pp. 17–22.
- PLDI-2001-HeintzeT #analysis
- Demand-Driven Pointer Analysis (NH, OT), pp. 24–34.
- PLDI-2001-MollerS #logic
- The Pointer Assertion Logic Engine (AM, MIS), pp. 221–231.
- PLDI-2001-VivienR #analysis
- Incrementalized Pointer and Escape Analysis (FV, MCR), pp. 35–46.
- SAS-2001-DasLFR #impact analysis #optimisation #scalability
- Estimating the Impact of Scalable Pointer Analysis on Optimization (MD, BL, MF, JR), pp. 260–278.
- SAS-2001-LiangH #analysis #interprocedural #performance
- Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses (DL, MJH), pp. 279–298.
- CC-2001-FrankeO #array #compilation
- Compiler Transformation of Pointers to Explicit Array Accesses in DSP Applications (BF, MFPO), pp. 69–85.
- CC-2001-StoutchininAGDJD #induction
- Speculative Prefetching of Induction Pointers (AS, JNA, GRG, JCD, SJ, AD), pp. 289–303.
- DATE-2001-Zhu01a #analysis #memory management
- Static memory allocation by pointer analysis and coloring (JZ), pp. 785–790.
- PPoPP-2001-SalcianuR #analysis #parallel #source code #thread
- Pointer and escape analysis for multithreaded programs (AS, MCR), pp. 12–23.
- ICPR-v1-2000-ShimizuS #mobile #navigation #visual notation
- Visual Navigation of Uncalibrated Mobile Robots from Uncalibrated Stereo Pointers (YS, JS), pp. 1346–1349.
- PEPM-2000-ScholzBF #analysis #detection #memory management
- Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
- PLDI-2000-ChengH #analysis #composition #design #evaluation #implementation #interprocedural #using
- Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
- PLDI-2000-Das #analysis
- Unification-based pointer analysis with directional assignments (MD), pp. 35–46.
- PLDI-2000-RuginaR #analysis #array #bound #memory management
- Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
- PPDP-2000-CalcagnoIO #alias #analysis #hoare #logic #semantics
- Semantic analysis of pointer aliasing, allocation and disposal in Hoare logic351292 (CC, SSI, PWO), pp. 190–201.
- ASPLOS-2000-KawahitoKN #effectiveness #hardware #null
- Effective Null Pointer Check Elimination Utilizing Hardware Trap (MK, HK, TN), pp. 139–149.
- DATE-2000-SemeriaSM #behaviour #c #memory management #synthesis
- Resolution of Dynamic Memory Allocation and Pointers for the Behavioral Synthesis from C (LS, KS, GDM), pp. 312–319.
- ISSTA-2000-HindP #analysis #question
- Which pointer analysis should I use? (MH, AP), pp. 113–123.
- CSMR-1999-AntoniolCT #graph
- Impact of Function Pointers on the Call Graph (GA, FC, PT), pp. 51–61.
- ICSM-1999-LiangH #interprocedural #recursion #slicing
- Reuse-Driven Interprocedural Slicing in the Presence of Pointers and Recursion (DL, MJH), p. 421–?.
- PASTE-1999-LiangH #analysis #data flow #equivalence #performance
- Equivalence Analysis: A General Technique to Improve the Efficiency of Data-flow Analyses in the Presence of Pointers (DL, MJH), pp. 39–46.
- FM-v1-1999-Wang #automation #process #verification
- Automatic Verification of Pointer Data-Structure Systems for All Numbers of Processes (FW), pp. 328–347.
- IFL-1999-JonesME #haskell
- Stretching the Storage Manager: Weak Pointers and Stable Names in Haskell (SLPJ, SM, CE), pp. 37–58.
- ECOOP-1999-HoareJ
- A Trace Model for Pointers and Objects (CARH, JH), pp. 1–17.
- OOPSLA-1999-WhaleyR #analysis #composition #java #source code
- Compositional Pointer and Escape Analysis for Java Programs (JW, MCR), pp. 187–206.
- PLDI-1999-RuginaR #analysis #parallel #source code #thread
- Pointer Analysis for Multithreaded Programs (RR, MCR), pp. 77–90.
- PLDI-1999-YongHR #analysis #source code
- Pointer Analysis for Programs with Structures and Casting (SHY, SH, TWR), pp. 91–103.
- ICSE-1999-YurRL #alias #analysis #incremental
- An Incremental Flow- and Context-Sensitive Pointer Aliasing Analysis (JSY, BGR, WL), pp. 442–451.
- STOC-1999-PonzioRV #communication #complexity
- The Communication Complexity of Pointer Chasing: Applications of Entropy and Sampling (SP, JR, SV), pp. 602–611.
- PASTE-1998-DorRS #analysis #detection #experience #fault #memory management
- Detecting Memory Errors via Static Pointer Analysis (Preliminary Experience) (ND, MR, SS), pp. 27–34.
- PASTE-1998-ZhangRL #alias #analysis
- Experiments with Combined Analysis for Pointer Aliasing (SZ, BGR, WL), pp. 11–18.
- ICPR-1998-HungYCHF #using
- Free-hand pointer by use of an active stereo vision system (YPH, YSY, YSC, IBH, CSF), pp. 1244–1246.
- PLDI-1998-HastiH #analysis #using
- Using Static Single Assignment Form to Improve Flow-Insensitive Pointer Analysis (RH, SH), pp. 97–105.
- POPL-1998-GhiyaH #analysis
- Putting Pointer Analysis to Work (RG, LJH), pp. 121–133.
- SAS-1998-HindP #alias #analysis
- Assessing the Effects of Flow-Sensitivity on Pointer Alias Analyses (MH, AP), pp. 57–81.
- FSE-1998-AtkinsonG #effectiveness #program analysis
- Effective Whole-Program Analysis in the Presence of Pointers (DCA, WGG), pp. 46–55.
- CC-1998-LapkowskiH #multi
- Extended SSA Numbering: Introducing SSA Properties to Language with Multi-level Pointers (CL, LJH), pp. 128–143.
- ESOP-1998-RossS #alias #dependence
- Building a Bridge between Pointer Aliases and Program Dependences (JLR, SS), pp. 221–235.
- HCI-SEC-1997-MatsushitaMA #interactive
- Lock-On Pointer: A Foundation for Human-Object Interaction (NM, MM, YA), pp. 193–196.
- PLDI-1997-JensenJKS #automation #higher-order #logic #monad #source code #using #verification
- Automatic Verification of Pointer Programs using Monadic Second-Order Logic (JLJ, MEJ, NK, MIS), pp. 226–236.
- SAS-1997-ShapiroH #analysis #precise
- The Effects of the Precision of Pointer Analysis (MS, SH), pp. 16–34.
- ASE-1997-GannodC #approach #automation #reverse engineering #source code
- A Formal Automated Approach for Reverse Engineering Programs with Pointers (GCG, BHCC), pp. 219–226.
- ICSE-1997-TonellaAFM #analysis #c++ #morphism #polymorphism #slicing
- Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing (PT, GA, RF, EM), pp. 433–443.
- PPoPP-1997-ZhangC #communication #optimisation #parallel
- Dynamic Pointer Alignment: Tiling and Communication Optimizations for Parallel Pointer-based Computations (XZ, AAC), pp. 37–47.
- STOC-1997-NisanB #concurrent
- Pointer Jumping Requires Concurrent Read (NN, ZBY), pp. 549–558.
- TAPSOFT-1997-MuthD #alias #analysis #complexity #on the
- On the Complexity of Function Pointer May-Alias Analysis (RM, SKD), pp. 381–392.
- ICFP-1996-WiseW #clustering #thread
- Static and Dynamic Partitioning of Pointers as Links and Threads (DSW, JW), pp. 42–49.
- ECOOP-1996-Minsky #alias #towards
- Towards Alias-Free Pointers (NHM), pp. 189–209.
- POPL-1996-GhiyaH #analysis #c #graph
- Is it a Tree, a DAG, or a Cyclic Graph? A Shape Analysis for Heap-Directed Pointers in C (RG, LJH), pp. 1–15.
- FSE-1996-ZhangRL #alias #analysis #composition #towards
- Program Decomposition for Pointer Aliasing: A Step Toward Practical Analyses (SZ, BGR, WL), pp. 81–92.
- ESOP-1996-FradetCM #algorithm #axiom #detection #fault #static analysis
- Static Detection of Pointer Errors: An Axiomatisation and a Checking Algorithm (PF, RC, DLM), pp. 125–140.
- ISSTA-1996-MarxF #approach #data flow #testing
- The Path-Wise Approach to Data Flow Testing with Pointer Variables (DISM, PGF), pp. 135–146.
- PEPM-1995-Deutsch #abstract interpretation #data type #induction #modelling #semantics
- Semantic models and abstract interpretation techniques for inductive data structures and pointers (AD), pp. 226–229.
- PLDI-1995-WilsonL #analysis #c #performance #source code
- Efficient Context-Sensitive Pointer Analysis for C Programs (RPW, MSL), p. 1–?.
- PLDI-1994-AustinBS #array #detection #fault #performance
- Efficient Detection of All Pointer and Array Access Errors (TMA, SEB, GSS), pp. 290–301.
- PLDI-1994-Deutsch #alias #analysis #interprocedural
- Interprocedural May-Alias Analysis for Pointers: Beyond k-limiting (AD), pp. 230–241.
- PLDI-1994-EmamiGH #analysis #interprocedural #points-to
- Context-Sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers (ME, RG, LJH), pp. 242–256.
- PLDI-1994-HummelHN #data flow #data type #dependence
- A General Data Dependence Test for Dynamic, Pointer-Based Data Structures (JH, LJH, AN), pp. 218–229.
- PEPM-1993-Andersen #analysis #c
- Binding-Time Analysis and the Taming of C Pointers (LOA), pp. 47–58.
- PLDI-1993-LandiRZ #alias #analysis #interprocedural
- Interprocedural Side Effect Analysis With Pointer Aliasing (WL, BGR, SZ), pp. 56–67.
- POPL-1993-ChoiBC #alias #interprocedural #performance
- Efficient Flow-Sensitive Interprocedural Computation of Pointer-Induced Aliases and Side Effects (JDC, MGB, PRC), pp. 232–245.
- VLDB-1992-WhiteD #performance
- A Performance Study of Alternative Object Faulting and Pointer Swizzling Strategies (SJW, DJD), pp. 419–431.
- ICALP-1992-ChazelleR #bound #complexity
- Lower Bounds on the Complexity of Simplex Range Reporting on a Pointer Machine (BC, BR), pp. 439–449.
- PLDI-1992-HendrenHN #abstraction #analysis #data type #imperative #recursion #source code
- Abstractions for Recursive Pointer Data Structures: Improving the Analysis of Imperative Programs (LJH, JH, AN), pp. 249–260.
- PLDI-1992-LandiR #algorithm #alias #approximate #interprocedural
- A Safe Approximate Algorithm for Interprocedural Pointer Aliasing (WL, BGR), pp. 235–248.
- Best-of-PLDI-1992-LandiR92a #algorithm #alias #approximate #interprocedural
- A safe approximate algorithm for interprocedural pointer aliasing (with retrospective) (WL, BGR), pp. 473–489.
- POPL-1991-LandiR #alias #classification #problem
- Pointer-Induced Aliasing: A Problem Classification (WL, BGR), pp. 93–103.
- LICS-1991-HungZ #logic #semantics
- Semantics of Pointers, Referencing and Dereferencing with Intensional Logic (HKH, JIZ), pp. 127–136.
- TAV-1991-AgrawalDS #slicing
- Dynamic Slicing in the Presence of Unconstrained Pointers (HA, RAD, EHS), pp. 60–73.
- TAV-1991-OstrandW #analysis #data flow #test coverage #testing
- Data Flow-Based Test Adequacy Analysis for Languages with Pointers (TJO, EJW), pp. 74–86.
- SIGMOD-1990-ShekitaC #evaluation #performance
- A Performance Evaluation of Pointer-Based Joins (EJS, MJC), pp. 300–311.
- PLDI-1990-ChaseWZ #analysis
- Analysis of Pointers and Structures (DRC, MNW, FKZ), pp. 296–310.
- Best-of-PLDI-1990-ChaseWZ90a #analysis
- Analysis of pointers and structures (with retrospective) (DRC, MNW, FKZ), pp. 343–359.
- STOC-1990-Poutre #bound #problem
- Lower Bounds for the Union-Find and the Split-Find Problem on Pointer Machines (JALP), pp. 34–44.
- PLDI-1989-HorwitzPR #analysis #dependence
- Dependence Analysis for Pointer Variables (SH, PP, TWR), pp. 28–40.
- POPL-1981-CartwrightHM #named
- Paths: An Abstract Alternative to Pointers (RC, RH, PM), pp. 14–27.
- POPL-1980-Suzuki #analysis
- Analysis of Pointer Rotation (NS), pp. 1–11.
- POPL-1980-Weihl #analysis #data flow #interprocedural
- Interprocedural Data Flow Analysis in the Presence of Pointers, Procedure Variables and Label Variables (WEW), pp. 83–94.
- DIPL-1976-Earnest
- A note on pointers (CPE), pp. 86–101.