BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
pointer
Google pointer

Tag #pointer

222 papers:

POPLPOPL-2020-MeyerW #data type #lifecycle #memory management
Pointer life cycle types for lock-free data structures with memory reclamation (RM0, SW), p. 36.
CCCC-2020-FegadeW #analysis #data type #modelling #scalability #semantics #using
Scalable pointer analysis of data structures using semantic models (PF, CW), pp. 39–50.
ICPCICPC-2019-ZyrianovNGCM #analysis #framework #implementation #named
srcPtr: a framework for implementing static pointer analysis approaches (VZ, CDN, DTG, MLC, JIM), pp. 144–147.
FSCDFSCD-2019-Naurois #recursion
Pointers in Recursion: Exploring the Tropics (PJdN), p. 18.
OOPSLAOOPSLA-2019-LuX #analysis #context-sensitive grammar #performance
Precision-preserving yet fast object-sensitive pointer analysis with partial context sensitivity (JL, JX), p. 29.
POPLPOPL-2019-BatzKKMN #logic #probability #reasoning #source code
Quantitative separation logic: a logic for reasoning about probabilistic pointer programs (KB, BLK, JPK, CM, TN0), p. 29.
POPLPOPL-2019-MemarianGDKRWS #c #semantics
Exploring C semantics and pointer provenance (KM, VBFG, BD, SK, AR, RNMW, PS), p. 32.
SASSAS-2019-LeiS #analysis #performance #precise
Fast and Precise Handling of Positive Weight Cycles for Field-Sensitive Pointer Analysis (YL, YS), pp. 27–47.
ASEASE-2019-MaYLYZ #c++ #fault #named #source code #static analysis
SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs (XM, JY, YL, JY0, JZ), pp. 1122–1125.
ASEASE-2019-WangC00S #analysis #fault #memory management #named
TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis (YW, GC, MZ0, MG0, JS), pp. 1170–1173.
ICSE-2019-XuSYX #named #null #precise #program repair
VFix: value-flow-guided precise program repair for null pointer dereferences (XX, YS, HY, JX), pp. 512–523.
ASPLOSASPLOS-2019-DavisWRNMBCCFGJ #c #named #runtime
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.
ASPLOSASPLOS-2019-WuSCL #using
Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells (XCW, TS, FTC, YL), pp. 645–657.
CASECASE-2019-LaiKPC #adaptation #novel #recognition
A Novel Scale Recognition Method for Pointer Meters Adapted to Different Types and Shapes (HL, QK, LP, CC), pp. 374–379.
VMCAIVMCAI-2019-BouillaguetBSY #analysis #deduction #in memory #memory management #modelling #verification
Exploiting Pointer Analysis in Memory Models for Deductive Verification (QB, FB, MS, BY), pp. 160–182.
CIKMCIKM-2018-SunJSPOW #multi #network #summary
Multi-Source Pointer Network for Product Title Summarization (FS, PJ, HS, CP, WO, XW), pp. 7–16.
OOPSLAOOPSLA-2018-LiTMS #analysis #context-sensitive grammar
Precision-guided context sensitivity for pointer analysis (YL0, TT0, AM, YS), p. 29.
ESEC-FSEESEC-FSE-2018-LiTMS #analysis #context-sensitive grammar #self
Scalability-first pointer analysis with self-tuning context-sensitivity (YL0, TT0, AM, YS), pp. 129–140.
ESOPESOP-2018-SkorstengaardDB #reasoning #stack
Reasoning About a Machine with Local Capabilities - Provably Safe Stack and Return Pointer Management (LS, DD, LB), pp. 475–501.
CAVCAV-2018-ArndtJKMN #exclamation #graph #java #source code #verification
Let this Graph Be Your Witness! - An Attestor for Verifying Java Pointer Programs (HA, CJ, JPK, CM, TN0), pp. 3–11.
SANERSANER-2017-DurieuxCSM #exception #generative #metaprogramming #null #using
Dynamic patch generation for null pointer exceptions using metaprogramming (TD, BC, LS, MM), pp. 349–358.
KDDKDD-2017-MottiniA #network #predict #using
Deep Choice Model Using Pointer Networks for Airline Itinerary Prediction (AM, RAA), pp. 1575–1583.
PLDIPLDI-2017-ThiessenL #analysis
Context transformations for pointer analysis (RT, OL), pp. 263–277.
ASEASE-2017-CoppaDD #execution #reasoning #symbolic computation
Rethinking pointer reasoning in symbolic execution (EC, DCD, CD), pp. 613–618.
CGOCGO-2017-MaalejPRGP #ambiguity #strict
Pointer disambiguation via strict inequalities (MM, VP, PR, LG, FMQP), pp. 134–147.
CADECADE-2017-TellezB #automation #proving #source code #verification
Automatically Verifying Temporal Properties of Pointer Programs with Cyclic Proof (GT, JB), pp. 491–508.
EDMEDM-2016-LambHUP
Portrait of an Indexer - Computing Pointers Into Instructional Videos (AL, JH, JDU, AP), pp. 601–602.
IFM-2016-Preoteasa #invariant #logic #programming #source code #using #verification
Verifying Pointer Programs Using Separation Logic and Invariant Based Programming in Isabelle (VP), pp. 457–473.
HaskellHaskell-2016-ChauhanKY #how
How to twist pointers without breaking them (SC, PPK, BAY), pp. 51–61.
ECOOPECOOP-2016-SpathDAB #analysis #java #named
Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (JS, LNQD, KA0, EB), p. 26.
OOPSLAOOPSLA-2016-AminT #java #null #scala #type system
Java and scala's type systems are unsound: the existential crisis of null pointers (NA, RT), pp. 838–848.
SASSAS-2016-TanLX #analysis #precise
Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting (TT0, YL0, JX), pp. 489–510.
CCCC-2016-DuckY #bound
Heap bounds protection with low fat pointers (GJD, RHCY), pp. 132–142.
CGOCGO-2016-PaisanteMBGP #analysis
Symbolic range analysis of pointers (VP, MM, LBeO, LG, FMQP), pp. 171–181.
CGOCGO-2016-SuiDX #analysis #parallel #source code #thread
Sparse flow-sensitive pointer analysis for multithreaded programs (YS, PD, JX), pp. 160–170.
VMCAIVMCAI-2016-DudkaHPTV #low level
From Low-Level Pointers to High-Level Containers (KD, LH, PP, MT, TV), pp. 431–452.
VMCAIVMCAI-2016-HazizaHMW
Pointer Race Freedom (FH, LH, RM0, SW), pp. 393–412.
ICEISICEIS-v2-2015-AizebojeP #approach #using
An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
OOPSLAOOPSLA-2015-AlvesGDLGRP #ambiguity #runtime
Runtime pointer disambiguation (PA, FG, JD, AL, TG, FR, FMQP), pp. 589–606.
ESEC-FSEESEC-FSE-2015-FuLB #analysis #automation #memory dump #memory management
Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
CGOCGO-2015-NagarajG #analysis #approximate #mining #using
Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
ICGTICGT-2014-JansenGN #execution #generative #induction #source code #symbolic computation
Generating Inductive Predicates for Symbolic Execution of Pointer-Manipulating Programs (CJ, FG, TN), pp. 65–80.
ICGTICGT-2014-JansenN #generative #graph #source code #summary
Generating Abstract Graph-Based Procedure Summaries for Pointer Programs (CJ, TN), pp. 49–64.
PLDIPLDI-2014-XiaoZZZ #persistent
Persistent pointer information (XX, QZ, JZ, CZ), p. 48.
SASSAS-2014-MadsenM #analysis #data flow #reachability
Sparse Dataflow Analysis with Pointers and Reachability (MM, AM), pp. 201–218.
SASSAS-2014-YeSX #analysis
Region-Based Selective Flow-Sensitive Pointer Analysis (SY, YS, JX), pp. 319–336.
CGOCGO-2014-NagarakatteMZ #named
WatchdogLite: Hardware-Accelerated Compiler-Based Pointer Checking (SN, MMKM, SZ), p. 175.
IJCARIJCAR-2014-StroderGBFFHS #memory management #proving #safety #source code #termination
Proving Termination and Memory Safety for Programs with Pointer Arithmetic (TS, JG, MB, FF, CF, JH, PSK), pp. 208–223.
DRRDRR-2013-YouSADT13a #image #ontology #retrieval #robust #segmentation #towards #visual notation
A robust pointer segmentation in biomedical images toward building a visual ontology for biomedical article retrieval (DY, MSS, SA, DDF, GRT).
SCAMSCAM-2013-BiallasOCH #analysis #named
PtrTracker: Pragmatic pointer analysis (SB, MCO, FC, RH), pp. 69–73.
SEKESEKE-2013-LiuWL #analysis #detection #named #online #performance
ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
ISMMISMM-2013-LiCK #analysis #graph #precise #scalability
Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
FoSSaCSFoSSaCS-2013-HofmannRS #morphism #source code
Pure Pointer Programs and Tree Isomorphism (MH, RR, US), pp. 321–336.
FMFM-2012-GiorginoS #algorithm #correctness
Correctness of Pointer Manipulating Algorithms Illustrated by a Verified BDD Construction (MG, MS), pp. 202–216.
CHICHI-2012-HenneckeMB #how #interactive
How screen transitions influence touch and pointer interaction across angled display arrangements (FH, WM, AB), pp. 209–212.
ECOOPECOOP-2012-DeD #analysis #java #scalability
Scalable Flow-Sensitive Pointer Analysis for Java with Strong Updates (AD, DD), pp. 665–687.
SASSAS-2012-KhedkerMR #analysis
Liveness-Based Pointer Analysis (UPK, AM, PSR), pp. 265–282.
IJCARIJCAR-2012-BoerBR #automation #recursion #source code #verification
Automated Verification of Recursive Programs with Pointers (FSdB, MMB, JR), pp. 149–163.
ISSTAISSTA-2012-CaballeroGMN #detection #named
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities (JC, GG, MM, AN), pp. 133–143.
SEKESEKE-2011-LiuL #analysis #parallel #petri net #thread
Multithreaded Pointer Analysis Based on Petri Net (FL, BL), pp. 127–130.
ASEASE-2011-MacleanIG #animation #correctness #functional #source code
The CORE system: Animation and functional correctness of pointer programs (EM, AI, GG), pp. 588–591.
CGOCGO-2011-HardekopfL #analysis
Flow-sensitive pointer analysis for millions of lines of code (BH, CL), pp. 289–298.
ESOPESOP-2011-SotinJ #analysis #interprocedural #precise #stack
Precise Interprocedural Analysis in the Presence of Pointers to the Stack (PS, BJ), pp. 459–479.
ICSTICST-2011-RomanoPA #approach #exception #null #testing
An Approach for Search Based Testing of Null Pointer Exceptions (DR, MDP, GA), pp. 160–169.
ISSTAISSTA-2011-Rubio-GonzalezL #fault #interactive #kernel #linux
Defective error/pointer interactions in the Linux kernel (CRG, BL), pp. 111–121.
IFMIFM-2010-DiosMP
Certified Absence of Dangling Pointers in a Language with Explicit Deallocation (JdD, MM, RP), pp. 305–319.
SACSAC-PL-J-2008-BussBSE10 #analysis #debugging #novel
A novel analysis space for pointer analysis and its application for bug finding (MB, DB, VCS, SAE), pp. 921–942.
CGOCGO-2010-YuXHFZ #analysis #scalability
Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code (HY, JX, WH, XF, ZZ), pp. 218–229.
VMCAIVMCAI-2010-Might #analysis
Shape Analysis in the Absence of Pointers and Structure (MM), pp. 263–278.
SEFMSEFM-2009-TatsutaCA #logic #verification
Completeness of Pointer Program Verification by Separation Logic (MT, WNC, MFAA), pp. 179–188.
POPLPOPL-2009-HardekopfL #analysis
Semi-sparse flow-sensitive pointer analysis (BH, CL), pp. 226–238.
SASSAS-2009-Simon #analysis #optimisation #similarity #using
Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
CGOCGO-2009-PereiraB #analysis
Wave Propagation and Deep Propagation for Pointer Analysis (FMQP, DB), pp. 126–135.
TACASTACAS-2009-VanoverbergheTP #generative #source code
Test Input Generation for Programs with Pointers (DV, NT, FP), pp. 277–291.
ISSTAISSTA-2009-ElkarabliehGL #generative #precise #reasoning #testing
Precise pointer reasoning for dynamic test generation (BE, PG, MYL), pp. 129–140.
LICSLICS-2009-HofmannS #reachability #source code
Pointer Programs and Undirected Reachability (MH, US), pp. 133–142.
FMFM-2008-NollR #thread #verification
Verifying Dynamic Pointer-Manipulating Threads (TN, SR), pp. 84–99.
RTARTA-2008-EchahedP
A Needed Rewriting Strategy for Data-Structures with Pointers (RE, NP), pp. 63–78.
PLDIPLDI-2008-Kahlon #alias #analysis #named #scalability
Bootstrapping: a technique for scalable flow and context-sensitive pointer alias analysis (VK), pp. 249–259.
SASSAS-2008-ConwayDNB #analysis #fault #proving
Pointer Analysis, Conditional Soundness, and Proving the Absence of Errors (CLC, DD, KSN, CB), pp. 62–77.
SASSAS-2008-PrabhuS #analysis #array #java #using
Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
SACSAC-2008-BussBSE #analysis #flexibility #graph #using
Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
PDPPDP-2008-NoguchiDB #migration #performance #process
Efficient Global Pointers With Spontaneous Process Migration (KN, MBD, LB), pp. 87–94.
CSLCSL-2008-HofmannS #source code
Pure Pointer Programs with Iteration (MH, US), pp. 79–93.
PASTEPASTE-2007-HovemeyerP #debugging #null
Finding more null pointer bugs, but not too many (DH, WP), pp. 9–14.
RTARTA-2007-EchahedP #confluence #strict #term rewriting
Non Strict Confluent Rewrite Systems for Data-Structures with Pointers (RE, NP), pp. 137–152.
ICFPICFP-2007-MarlowYJ #lazy evaluation #performance #using
Faster laziness using dynamic pointer tagging (SM, ARY, SLPJ), pp. 277–288.
HCIHCI-IPT-2007-KimLLL #flexibility #interactive
Vision Based Laser Pointer Interaction for Flexible Screens (NWK, SJL, BGL, JJL), pp. 845–853.
ECOOPECOOP-2007-VenstermansEB #java #virtual machine
Object-Relative Addressing: Compressed Pointers in 64-Bit Java Virtual Machines (KV, LE, KDB), pp. 79–100.
PLDIPLDI-2007-HardekopfL #analysis #performance
The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code (BH, CL), pp. 290–299.
SASSAS-2007-HardekopfL #analysis #equivalence
Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis (BH, CL), pp. 265–280.
SASSAS-2007-KamilY #analysis #distributed #source code
Hierarchical Pointer Analysis for Distributed Programs (AK, KAY), pp. 281–297.
CCCC-2007-BakerCPV #garbage collection #lazy evaluation
Accurate Garbage Collection in Uncooperative Environments with Lazy Pointer Stacks (JB, AC, FP, JV), pp. 64–79.
DATEDATE-2007-ParkPBBKD #architecture #embedded #performance
Register pointer architecture for efficient embedded processors (JP, SBP, JDB, DBS, CK, WJD), pp. 600–605.
FMFM-2006-Preoteasa #logic #recursion #using #verification
Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic (VP), pp. 508–523.
ICGTICGT-2006-EchahedP
Narrowing Data-Structures with Pointers (RE, NP), pp. 92–106.
CHICHI-2006-JiangOMS #interactive #using
Direct pointer: direct manipulation for large-display interaction using handheld cameras (HJ, EO, NM, YS), pp. 1107–1110.
SOFTVISSOFTVIS-2006-HundhausenBF #algorithm #design #visualisation
Adding procedures and pointers to the ALVIS algorithm visualization software: a preliminary design (CDH, JLB, SF), pp. 155–156.
ICPRICPR-v4-2006-SekoYSMK #metric
Proposal of recordable pointer: Pointed position measurement by projecting interference concentric circle pattern with a pointing device (YS, YY, YS, JM, HK), pp. 825–828.
POPLPOPL-2006-NiS #assembly #embedded #programming
Certified assembly programming with embedded code pointers (ZN, ZS), pp. 320–333.
POPLPOPL-2006-Thielecke
Frame rules from answer types for code pointers (HT), pp. 309–319.
SASSAS-2006-CalcagnoDOY #abstraction #reachability
Beyond Reachability: Shape Abstraction in the Presence of Pointer Arithmetic (CC, DD, PWO, HY), pp. 182–203.
ASPLOSASPLOS-2006-SilvaS #analysis #optimisation #probability
A probabilistic pointer analysis for speculative optimizations (JDS, JGS), pp. 416–425.
CCCC-2006-TokGL #analysis #data flow #interprocedural #performance
Efficient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers (TBT, SZG, CL), pp. 17–31.
LCTESLCTES-2006-Mine #analysis #c #embedded #source code
Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics (AM), pp. 54–63.
ESOPESOP-2006-JiaW #automation #named #reasoning #source code
ILC: A Foundation for Automated Reasoning About Pointer Programs (LJ, DW), pp. 131–145.
PASTEPASTE-2005-HovemeyerSP #debugging #null #static analysis
Evaluating and tuning a static analysis to find null pointer bugs (DH, JS, WP), pp. 13–19.
SCAMSCAM-2005-BussEYW #analysis #text-to-text
Pointer Analysis for Source-to-Source Transformations (MB, SAE, BY, DGW), pp. 139–150.
CHICHI-2005-PoFB #interactive
Comparing cursor orientations for mouse, pointer, and pen interaction (BAP, BDF, KSB), pp. 291–300.
PADLPADL-2005-ZhuX #programming
Safe Programming with Pointers Through Stateful Views (DZ, HX), pp. 83–97.
ASEASE-2005-GotliebDB #constraints #generative #testing
Constraint-based test data generation in the presence of stack-directed pointers (AG, TD, BB), pp. 313–316.
ICSEICSE-2005-AvotsDLL #analysis #c #security
Improving software security with a C pointer analysis (DA, MD, VBL, MSL), pp. 332–341.
CGOCGO-2005-GuoBTORA #analysis #low level
Practical and Accurate Low-Level Pointer Analysis (BG, MJB, ST, GO, ER, DIA), pp. 291–302.
DACDAC-2005-Zhu #analysis #scalability #towards
Towards scalable flow and context sensitive pointer analysis (JZ), pp. 831–836.
ESOPESOP-2005-LeeYY #analysis #automation #grammarware #source code #using #verification
Automatic Verification of Pointer Programs Using Grammar-Based Shape Analysis (OL, HY, KY), pp. 124–140.
CSLCSL-2005-CharatonikGM #bound #model checking #source code
Bounded Model Checking of Pointer Programs (WC, LG, PM), pp. 397–412.
PASTEPASTE-2004-NystromKH #analysis
Importance of heap specialization in pointer analysis (EMN, HSK, WmWH), pp. 43–48.
PASTEPASTE-2004-PearceKH #analysis #c #performance
Efficient field-sensitive pointer analysis for C (DJP, PHJK, CH), pp. 37–42.
ECOOPECOOP-2004-HirzelDH #analysis
Pointer Analysis in the Presence of Dynamic Class Loading (MH, AD, MH), pp. 96–122.
PLDIPLDI-2004-WhaleyL #alias #analysis #diagrams #using
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams (JW, MSL), pp. 131–144.
PLDIPLDI-2004-ZhuC #analysis #revisited
Symbolic pointer analysis revisited (JZ, SC), pp. 145–157.
SASSAS-2004-NystromKH #analysis #bottom-up #top-down
Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis (EMN, HSK, WmWH), pp. 165–180.
SASSAS-2004-Venet #analysis #embedded #scalability #source code
A Scalable Nonuniform Pointer Analysis for Embedded Programs (AV), pp. 149–164.
PDPPDP-2004-AsenjoCGNPZ #optimisation #source code
Optimization Techniques for Irregular and Pointer-Based Programs (RA, FC, EG, MAN, OGP, ELZ), p. 2–?.
SCAMSCAM-2003-PearceKH #analysis #detection #difference #online
Online Cycle Detection and Difference Propagation for Pointer Analysis (DJP, PHJK, CH), pp. 3–12.
FMFME-2003-Abrial #development
Event Based Sequential Program Development: Application to Constructing a Pointer Program (JRA), pp. 51–74.
AGTIVEAGTIVE-2003-BakewellPR #graph #reduction #specification
Specifying Pointer Structures by Graph Reduction (AB, DP, CR), pp. 30–44.
SASSAS-2003-GuyerL #analysis
Client-Driven Pointer Analysis (SZG, CL), pp. 214–236.
ESEC-FSEESEC-FSE-2003-LivshitsL #c #context-sensitive grammar #debugging #detection #source code
Tracking pointers with path and context sensitivity for bug detection in C programs (VBL, MSL), pp. 317–326.
ESEC-FSEESEC-FSE-2003-YongH #c #source code
Protecting C programs from attacks via invalid pointer dereferences (SHY, SH), pp. 307–316.
SACSAC-2003-NandaR #analysis #java #parallel #source code #thread
Pointer Analysis of Multithreaded Java Programs (MGN, SR), pp. 1068–1075.
FASEFASE-2003-Kubica #approach #specification #verification
A Temporal Approach to Specification and Verification of Pointer Data-Structures (MK), pp. 231–245.
CADECADE-2003-MehtaN #higher-order #logic #proving #source code
Proving Pointer Programs in Higher-Order Logic (FM, TN), pp. 121–135.
SCAMSCAM-2002-MilanovaRR #graph #precise
Precise Call Graph Construction in the Presence of Function Pointers (AM, AR, BGR), pp. 155–162.
CHICHI-2002-MyersBNPKML #distance #performance
Interacting at a distance: measuring the performance of laser pointers and other devices (BAM, RB, JN, CHP, DK, RCM, ACL), pp. 33–40.
SASSAS-2002-AdamsBDLRSW #analysis #data flow #using
Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis (SA, TB, MD, SL, SKR, MS, WW), pp. 230–246.
ASEASE-2002-VisvanathanG #generative #testing
Generating Test Data for Functions with Pointer Inputs (SV, NG), p. 149–?.
SACSAC-2002-Moreau #fault tolerance #mobile
A fault-tolerant directory service for mobile agents based on forwarding pointers (LM), pp. 93–100.
STOCSTOC-2002-BrodalLMTT
Optimal finger search trees in the pointer machine (GSB, GL, CM, AKT, KT), pp. 583–591.
ITiCSEITiCSE-2001-Kumar #c++ #interactive #learning
Learning the interaction between pointers and scope in C++ (ANK), pp. 45–48.
IWPCIWPC-2001-OrsoSH #data flow #dependence
Effects of Pointers on Data Dependences (AO, SS, MJH), pp. 39–49.
PASTEPASTE-2001-Hind #analysis #problem #question
Pointer analysis: haven’t we solved this problem yet? (MH), pp. 54–61.
CHICHI-2001-OlsenN #interactive
Laser pointer interaction (DRO, STN), pp. 17–22.
PLDIPLDI-2001-HeintzeT #analysis
Demand-Driven Pointer Analysis (NH, OT), pp. 24–34.
PLDIPLDI-2001-MollerS #logic
The Pointer Assertion Logic Engine (AM, MIS), pp. 221–231.
PLDIPLDI-2001-VivienR #analysis
Incrementalized Pointer and Escape Analysis (FV, MCR), pp. 35–46.
SASSAS-2001-DasLFR #impact analysis #optimisation #scalability
Estimating the Impact of Scalable Pointer Analysis on Optimization (MD, BL, MF, JR), pp. 260–278.
SASSAS-2001-LiangH #analysis #interprocedural #performance
Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses (DL, MJH), pp. 279–298.
CCCC-2001-FrankeO #array #compilation
Compiler Transformation of Pointers to Explicit Array Accesses in DSP Applications (BF, MFPO), pp. 69–85.
CCCC-2001-StoutchininAGDJD #induction
Speculative Prefetching of Induction Pointers (AS, JNA, GRG, JCD, SJ, AD), pp. 289–303.
DATEDATE-2001-Zhu01a #analysis #memory management
Static memory allocation by pointer analysis and coloring (JZ), pp. 785–790.
PPoPPPPoPP-2001-SalcianuR #analysis #parallel #source code #thread
Pointer and escape analysis for multithreaded programs (AS, MCR), pp. 12–23.
ICPRICPR-v1-2000-ShimizuS #mobile #navigation #visual notation
Visual Navigation of Uncalibrated Mobile Robots from Uncalibrated Stereo Pointers (YS, JS), pp. 1346–1349.
PEPMPEPM-2000-ScholzBF #analysis #detection #memory management
Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
PLDIPLDI-2000-ChengH #analysis #composition #design #evaluation #implementation #interprocedural #using
Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
PLDIPLDI-2000-Das #analysis
Unification-based pointer analysis with directional assignments (MD), pp. 35–46.
PLDIPLDI-2000-RuginaR #analysis #array #bound #memory management
Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
PPDPPPDP-2000-CalcagnoIO #alias #analysis #hoare #logic #semantics
Semantic analysis of pointer aliasing, allocation and disposal in Hoare logic351292 (CC, SSI, PWO), pp. 190–201.
ASPLOSASPLOS-2000-KawahitoKN #effectiveness #hardware #null
Effective Null Pointer Check Elimination Utilizing Hardware Trap (MK, HK, TN), pp. 139–149.
DATEDATE-2000-SemeriaSM #behaviour #c #memory management #synthesis
Resolution of Dynamic Memory Allocation and Pointers for the Behavioral Synthesis from C (LS, KS, GDM), pp. 312–319.
ISSTAISSTA-2000-HindP #analysis #question
Which pointer analysis should I use? (MH, AP), pp. 113–123.
CSMRCSMR-1999-AntoniolCT #graph
Impact of Function Pointers on the Call Graph (GA, FC, PT), pp. 51–61.
ICSMEICSM-1999-LiangH #interprocedural #recursion #slicing
Reuse-Driven Interprocedural Slicing in the Presence of Pointers and Recursion (DL, MJH), p. 421–?.
PASTEPASTE-1999-LiangH #analysis #data flow #equivalence #performance
Equivalence Analysis: A General Technique to Improve the Efficiency of Data-flow Analyses in the Presence of Pointers (DL, MJH), pp. 39–46.
FMFM-v1-1999-Wang #automation #process #verification
Automatic Verification of Pointer Data-Structure Systems for All Numbers of Processes (FW), pp. 328–347.
IFLIFL-1999-JonesME #haskell
Stretching the Storage Manager: Weak Pointers and Stable Names in Haskell (SLPJ, SM, CE), pp. 37–58.
ECOOPECOOP-1999-HoareJ
A Trace Model for Pointers and Objects (CARH, JH), pp. 1–17.
OOPSLAOOPSLA-1999-WhaleyR #analysis #composition #java #source code
Compositional Pointer and Escape Analysis for Java Programs (JW, MCR), pp. 187–206.
PLDIPLDI-1999-RuginaR #analysis #parallel #source code #thread
Pointer Analysis for Multithreaded Programs (RR, MCR), pp. 77–90.
PLDIPLDI-1999-YongHR #analysis #source code
Pointer Analysis for Programs with Structures and Casting (SHY, SH, TWR), pp. 91–103.
ICSEICSE-1999-YurRL #alias #analysis #incremental
An Incremental Flow- and Context-Sensitive Pointer Aliasing Analysis (JSY, BGR, WL), pp. 442–451.
STOCSTOC-1999-PonzioRV #communication #complexity
The Communication Complexity of Pointer Chasing: Applications of Entropy and Sampling (SP, JR, SV), pp. 602–611.
PASTEPASTE-1998-DorRS #analysis #detection #experience #fault #memory management
Detecting Memory Errors via Static Pointer Analysis (Preliminary Experience) (ND, MR, SS), pp. 27–34.
PASTEPASTE-1998-ZhangRL #alias #analysis
Experiments with Combined Analysis for Pointer Aliasing (SZ, BGR, WL), pp. 11–18.
ICPRICPR-1998-HungYCHF #using
Free-hand pointer by use of an active stereo vision system (YPH, YSY, YSC, IBH, CSF), pp. 1244–1246.
PLDIPLDI-1998-HastiH #analysis #using
Using Static Single Assignment Form to Improve Flow-Insensitive Pointer Analysis (RH, SH), pp. 97–105.
POPLPOPL-1998-GhiyaH #analysis
Putting Pointer Analysis to Work (RG, LJH), pp. 121–133.
SASSAS-1998-HindP #alias #analysis
Assessing the Effects of Flow-Sensitivity on Pointer Alias Analyses (MH, AP), pp. 57–81.
FSEFSE-1998-AtkinsonG #effectiveness #program analysis
Effective Whole-Program Analysis in the Presence of Pointers (DCA, WGG), pp. 46–55.
CCCC-1998-LapkowskiH #multi
Extended SSA Numbering: Introducing SSA Properties to Language with Multi-level Pointers (CL, LJH), pp. 128–143.
ESOPESOP-1998-RossS #alias #dependence
Building a Bridge between Pointer Aliases and Program Dependences (JLR, SS), pp. 221–235.
HCIHCI-SEC-1997-MatsushitaMA #interactive
Lock-On Pointer: A Foundation for Human-Object Interaction (NM, MM, YA), pp. 193–196.
PLDIPLDI-1997-JensenJKS #automation #higher-order #logic #monad #source code #using #verification
Automatic Verification of Pointer Programs using Monadic Second-Order Logic (JLJ, MEJ, NK, MIS), pp. 226–236.
SASSAS-1997-ShapiroH #analysis #precise
The Effects of the Precision of Pointer Analysis (MS, SH), pp. 16–34.
ASEASE-1997-GannodC #approach #automation #reverse engineering #source code
A Formal Automated Approach for Reverse Engineering Programs with Pointers (GCG, BHCC), pp. 219–226.
ICSEICSE-1997-TonellaAFM #analysis #c++ #morphism #polymorphism #slicing
Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing (PT, GA, RF, EM), pp. 433–443.
PPoPPPPoPP-1997-ZhangC #communication #optimisation #parallel
Dynamic Pointer Alignment: Tiling and Communication Optimizations for Parallel Pointer-based Computations (XZ, AAC), pp. 37–47.
STOCSTOC-1997-NisanB #concurrent
Pointer Jumping Requires Concurrent Read (NN, ZBY), pp. 549–558.
TAPSOFTTAPSOFT-1997-MuthD #alias #analysis #complexity #on the
On the Complexity of Function Pointer May-Alias Analysis (RM, SKD), pp. 381–392.
ICFPICFP-1996-WiseW #clustering #thread
Static and Dynamic Partitioning of Pointers as Links and Threads (DSW, JW), pp. 42–49.
ECOOPECOOP-1996-Minsky #alias #towards
Towards Alias-Free Pointers (NHM), pp. 189–209.
POPLPOPL-1996-GhiyaH #analysis #c #graph
Is it a Tree, a DAG, or a Cyclic Graph? A Shape Analysis for Heap-Directed Pointers in C (RG, LJH), pp. 1–15.
FSEFSE-1996-ZhangRL #alias #analysis #composition #towards
Program Decomposition for Pointer Aliasing: A Step Toward Practical Analyses (SZ, BGR, WL), pp. 81–92.
ESOPESOP-1996-FradetCM #algorithm #axiom #detection #fault #static analysis
Static Detection of Pointer Errors: An Axiomatisation and a Checking Algorithm (PF, RC, DLM), pp. 125–140.
ISSTAISSTA-1996-MarxF #approach #data flow #testing
The Path-Wise Approach to Data Flow Testing with Pointer Variables (DISM, PGF), pp. 135–146.
PEPMPEPM-1995-Deutsch #abstract interpretation #data type #induction #modelling #semantics
Semantic models and abstract interpretation techniques for inductive data structures and pointers (AD), pp. 226–229.
PLDIPLDI-1995-WilsonL #analysis #c #performance #source code
Efficient Context-Sensitive Pointer Analysis for C Programs (RPW, MSL), p. 1–?.
PLDIPLDI-1994-AustinBS #array #detection #fault #performance
Efficient Detection of All Pointer and Array Access Errors (TMA, SEB, GSS), pp. 290–301.
PLDIPLDI-1994-Deutsch #alias #analysis #interprocedural
Interprocedural May-Alias Analysis for Pointers: Beyond k-limiting (AD), pp. 230–241.
PLDIPLDI-1994-EmamiGH #analysis #interprocedural #points-to
Context-Sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers (ME, RG, LJH), pp. 242–256.
PLDIPLDI-1994-HummelHN #data flow #data type #dependence
A General Data Dependence Test for Dynamic, Pointer-Based Data Structures (JH, LJH, AN), pp. 218–229.
PEPMPEPM-1993-Andersen #analysis #c
Binding-Time Analysis and the Taming of C Pointers (LOA), pp. 47–58.
PLDIPLDI-1993-LandiRZ #alias #analysis #interprocedural
Interprocedural Side Effect Analysis With Pointer Aliasing (WL, BGR, SZ), pp. 56–67.
POPLPOPL-1993-ChoiBC #alias #interprocedural #performance
Efficient Flow-Sensitive Interprocedural Computation of Pointer-Induced Aliases and Side Effects (JDC, MGB, PRC), pp. 232–245.
VLDBVLDB-1992-WhiteD #performance
A Performance Study of Alternative Object Faulting and Pointer Swizzling Strategies (SJW, DJD), pp. 419–431.
ICALPICALP-1992-ChazelleR #bound #complexity
Lower Bounds on the Complexity of Simplex Range Reporting on a Pointer Machine (BC, BR), pp. 439–449.
PLDIPLDI-1992-HendrenHN #abstraction #analysis #data type #imperative #recursion #source code
Abstractions for Recursive Pointer Data Structures: Improving the Analysis of Imperative Programs (LJH, JH, AN), pp. 249–260.
PLDIPLDI-1992-LandiR #algorithm #alias #approximate #interprocedural
A Safe Approximate Algorithm for Interprocedural Pointer Aliasing (WL, BGR), pp. 235–248.
PLDIBest-of-PLDI-1992-LandiR92a #algorithm #alias #approximate #interprocedural
A safe approximate algorithm for interprocedural pointer aliasing (with retrospective) (WL, BGR), pp. 473–489.
POPLPOPL-1991-LandiR #alias #classification #problem
Pointer-Induced Aliasing: A Problem Classification (WL, BGR), pp. 93–103.
LICSLICS-1991-HungZ #logic #semantics
Semantics of Pointers, Referencing and Dereferencing with Intensional Logic (HKH, JIZ), pp. 127–136.
ISSTATAV-1991-AgrawalDS #slicing
Dynamic Slicing in the Presence of Unconstrained Pointers (HA, RAD, EHS), pp. 60–73.
ISSTATAV-1991-OstrandW #analysis #data flow #test coverage #testing
Data Flow-Based Test Adequacy Analysis for Languages with Pointers (TJO, EJW), pp. 74–86.
SIGMODSIGMOD-1990-ShekitaC #evaluation #performance
A Performance Evaluation of Pointer-Based Joins (EJS, MJC), pp. 300–311.
PLDIPLDI-1990-ChaseWZ #analysis
Analysis of Pointers and Structures (DRC, MNW, FKZ), pp. 296–310.
PLDIBest-of-PLDI-1990-ChaseWZ90a #analysis
Analysis of pointers and structures (with retrospective) (DRC, MNW, FKZ), pp. 343–359.
STOCSTOC-1990-Poutre #bound #problem
Lower Bounds for the Union-Find and the Split-Find Problem on Pointer Machines (JALP), pp. 34–44.
PLDIPLDI-1989-HorwitzPR #analysis #dependence
Dependence Analysis for Pointer Variables (SH, PP, TWR), pp. 28–40.
POPLPOPL-1981-CartwrightHM #named
Paths: An Abstract Alternative to Pointers (RC, RH, PM), pp. 14–27.
POPLPOPL-1980-Suzuki #analysis
Analysis of Pointer Rotation (NS), pp. 1–11.
POPLPOPL-1980-Weihl #analysis #data flow #interprocedural
Interprocedural Data Flow Analysis in the Presence of Pointers, Procedure Variables and Label Variables (WEW), pp. 83–94.
AdaDIPL-1976-Earnest
A note on pointers (CPE), pp. 86–101.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.