咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 8 篇 计算机科学与技术...
    • 4 篇 软件工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 10 篇 control-flow gra...
  • 2 篇 computer archite...
  • 2 篇 data mining
  • 2 篇 source-code metr...
  • 2 篇 performance pred...
  • 1 篇 tracer
  • 1 篇 compilers
  • 1 篇 exceptions
  • 1 篇 runtime informat...
  • 1 篇 intervals
  • 1 篇 immediate post-d...
  • 1 篇 fourier analysis
  • 1 篇 type systems
  • 1 篇 program embeddin...
  • 1 篇 permissive-upgra...
  • 1 篇 type soundness
  • 1 篇 program visualiz...
  • 1 篇 optimization
  • 1 篇 graph neural net...
  • 1 篇 control-flow int...

机构

  • 2 篇 kit inst program...
  • 2 篇 kit inst comp sc...
  • 1 篇 penn state univ ...
  • 1 篇 saarland univ sa...
  • 1 篇 iit gandhinagar ...
  • 1 篇 univ potsdam pot...
  • 1 篇 queens univ elec...
  • 1 篇 harvard univ div...
  • 1 篇 univ paris sacla...
  • 1 篇 max planck inst ...
  • 1 篇 visa res secur c...
  • 1 篇 univ lisbon ist ...
  • 1 篇 nanjing univ dep...
  • 1 篇 max planck inst ...
  • 1 篇 univ lisbon ist/...
  • 1 篇 hong kong univ s...

作者

  • 2 篇 kramer david
  • 2 篇 boehm klemens
  • 2 篇 karl wolfgang
  • 2 篇 eichinger frank
  • 1 篇 wang linzhang
  • 1 篇 ferreira diogo r...
  • 1 篇 bichhawat abhish...
  • 1 篇 wolff burkhart
  • 1 篇 lam chun kit
  • 1 篇 aissat romain
  • 1 篇 conrado giovanna...
  • 1 篇 garg deepak
  • 1 篇 ramsey norman
  • 1 篇 wang ke
  • 1 篇 dias joao
  • 1 篇 goharshady amir ...
  • 1 篇 voisin frederic
  • 1 篇 hammer christian
  • 1 篇 rajani vineet
  • 1 篇 moreno carlos

语言

  • 9 篇 英文
  • 1 篇 其他
检索条件"主题词=Control-flow Graphs"
10 条 记 录,以下是1-10 订阅
排序:
The Bounded Pathwidth of control-flow graphs
收藏 引用
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL 2023年 第OOPSLA期7卷 292–317页
作者: Conrado, Giovanna Kobus Goharshady, Amir Kafshdar Lam, Chun Kit Hong Kong Univ Sci & Technol Dept Math Dept Comp Sci & Engn Clear Water Bay Hong Kong Peoples R China
Pathwidth and treewidth are standard and well-studied graph sparsity parameters which intuitively model the degree to which a given graph resembles a path or a tree, respectively. It is well-known that the control-flo... 详细信息
来源: 评论
Annotating control-flow graphs for Formalized Test Coverage Criteria
Annotating Control-Flow Graphs for Formalized Test Coverage ...
收藏 引用
17th IEEE International Conference on Software Testing, Verification, and Validation (ICST)
作者: Kauffman, Sean Moreno, Carlos Fischmeister, Sebastian Queens Univ Elect & Comp Engn Kingston ON Canada
control flow coverage criteria are an important part of the process of qualifying embedded software for safety-critical systems. Criteria such as modified condition/decision coverage (MC/DC) as defined by DO-178B are ... 详细信息
来源: 评论
From source code to runtime behaviour: Software metrics help to select the computer architecture
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2010年 第4期23卷 343-349页
作者: Eichinger, Frank Kramer, David Boehm, Klemens Karl, Wolfgang KIT Inst Programme Struct & Data Org IPD D-76128 Karlsruhe Germany KIT Inst Comp Sci & Engn ITEC D-76128 Karlsruhe Germany
The decision which hardware platform to use for a certain application is an important problem in computer architecture This paper reports on a study where a data-mining approach is used for this decision It relies pur... 详细信息
来源: 评论
Permissive runtime information flow control in the presence of exceptions
收藏 引用
JOURNAL OF COMPUTER SECURITY 2021年 第4期29卷 361-401页
作者: Bichhawat, Abhishek Rajani, Vineet Garg, Deepak Hammer, Christian IIT Gandhinagar Gandhinagar India Max Planck Inst Secur & Privacy Bochum Germany Max Planck Inst Software Syst Saarland Informat Campus Saarbrucken Germany Univ Potsdam Potsdam Germany Saarland Univ Saarbrucken Germany
Information flow control (IFC) has been extensively studied as an approach to mitigate information leaks in applications. A vast majority of existing work in this area is based on static analysis. However, some applic... 详细信息
来源: 评论
Learning Semantic Program Embeddings with Graph Interval Neural Network
收藏 引用
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL 2020年 第OOPSLA期4卷 1–27页
作者: Wang, Yu Wang, Ke Gao, Fengjuan Wang, Linzhang Nanjing Univ Dept Comp Sci & Technol State Key Lab Novel Software Technol Nanjing 210023 Jiangsu Peoples R China Visa Res Secur Cryptog & Blockchain Palo Alto CA USA
Learning distributed representations of source code has been a challenging task for machine learning models. Earlier works treated programs as text so that natural language methods can be readily applied. Unfortunatel... 详细信息
来源: 评论
Automatic Extraction of Process control flow from I/O Operations
收藏 引用
6th International Conference on Business Process Management
作者: Diniz, Pedro C. Ferreira, Diogo R. Univ Lisbon IST INESC ID Lisbon Portugal Univ Lisbon IST/INOV Tech Lisbon Portugal
Many end users will expect the output of process mining to be a model they can easily understand. On the other hand, knowing which objects were accessed in each operation can be a valuable input for process discovery.... 详细信息
来源: 评论
From source code to runtime behaviour: Software metrics help to select the computer architecture
收藏 引用
29th SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence
作者: Eichinger, Frank Kramer, David Boehm, Klemens Karl, Wolfgang KIT Inst Programme Struct & Data Org IPD D-76128 Karlsruhe Germany KIT Inst Comp Sci & Engn ITEC D-76128 Karlsruhe Germany
The decision which hardware platform to use for a certain application is an important problem in computer architecture This paper reports on a study where a data-mining approach is used for this decision It relies pur... 详细信息
来源: 评论
Infeasible Paths Elimination by Symbolic Execution Techniques Proof of Correctness and Preservation of Paths  7th
Infeasible Paths Elimination by Symbolic Execution Technique...
收藏 引用
7th International Conference on Interactive Theorem Proving (ITP)
作者: Aissat, Romain Voisin, Frederic Wolff, Burkhart Univ Paris Saclay LRI Univ Paris Sud CNRSCent Supelec Orsay France
TRACER [8] is a tool for verifying safety properties of sequential C programs. TRACER attempts at building a finite symbolic execution graph which over-approximates the set of all concrete reachable states and the set... 详细信息
来源: 评论
CFG Construction Soundness in control-flow Integrity  12
CFG Construction Soundness in Control-Flow Integrity
收藏 引用
12th ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS)
作者: Tan, Gang Jaeger, Trent Penn State Univ University Pk PA 16802 USA
control-flow Integrity (CFI) is an intensively studied technique for hardening software security. It enforces a control-flow Graph (CFG) by inlining runtime checks into target programs. Many methods have been proposed... 详细信息
来源: 评论
An Applicative control-flow Graph Based on Huet's Zipper
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2006年 第2期148卷 105-126页
作者: Ramsey, Norman Dias, Joao Harvard Univ Div Engn & Appl Sci Cambridge MA 02138 USA
We are using ML to build a compiler that does low-level optimization. To support optimizations in classic imperative style, we built a control-flow graph using mutable pointers and other mutable state in the nodes. Th... 详细信息
来源: 评论