9 papers:
- SEKE-2015-HuangWSQ #android #fine-grained #named #policy #security
- DefDroid: Securing Android with Fine-Grained Security Policy (CH, SW, HS, ZQ), pp. 375–378.
- ECMFA-2013-AmbertBLLP #approach #modelling #testing
- Applying a Def-Use Approach on Signal Exchange to Implement SysML Model-Based Testing (FA, FB, JL, BL, FP), pp. 134–151.
- SIGIR-2003-Blair-GoldensohnMS #hybrid #named
- DefScriber: a hybrid system for definitional QA (SBG, KM, AHS), p. 462.
- CSMR-2002-HajnalF #algorithm #precise
- A Precise Demand-Driven Def-Use Chaining Algorithm (ÁH, IF), p. 77–?.
- ESOP-2001-GenaimC #analysis #approach #dependence
- The Def-inite Approach to Dependency Analysis (SG, MC), pp. 417–432.
- PASTE-2001-SouterP
- Contextual def-use associations for object aggregation (ALS, LLP), pp. 13–19.
- CSMR-1999-Tonella #analysis #points-to #set
- Effects of Different Flow Insensitive Points-to Analyses on DEF/USE Sets (PT), pp. 62–71.
- PASTE-1999-SouterPH #analysis
- Inter-Class Def-Use Analysis with Partial Class Representations (ALS, LLP, DH), pp. 47–56.
- TAV-1991-PandeL #c #interprocedural #source code
- Interprocedural Def-Use Associations in C Programs (HDP, WL), pp. 139–153.