咨询与建议

限定检索结果

文献类型

  • 75 篇 期刊文献
  • 58 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 136 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 103 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 27 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
  • 9 篇 理学
    • 6 篇 数学
    • 2 篇 化学
    • 1 篇 物理学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 136 篇 data-flow analys...
  • 15 篇 static analysis
  • 10 篇 languages
  • 10 篇 algorithms
  • 9 篇 abstract interpr...
  • 7 篇 partial redundan...
  • 6 篇 performance
  • 6 篇 program analysis
  • 5 篇 model checking
  • 5 篇 interprocedural ...
  • 4 篇 ifds
  • 4 篇 data flow analys...
  • 4 篇 taint analysis
  • 4 篇 theory
  • 3 篇 compilers
  • 3 篇 code optimizatio...
  • 3 篇 program slicing
  • 3 篇 code motion
  • 3 篇 static program a...
  • 3 篇 compiler

机构

  • 2 篇 chinese acad sci...
  • 2 篇 chinese acad sci...
  • 2 篇 princeton univ d...
  • 2 篇 univ waterloo de...
  • 2 篇 colorado state u...
  • 2 篇 univ chinese aca...
  • 2 篇 northeastern uni...
  • 2 篇 univ oxford comp...
  • 2 篇 mit csail cambri...
  • 2 篇 univ illinois de...
  • 2 篇 univ munster dep...
  • 2 篇 inria rhone alpe...
  • 2 篇 univ british col...
  • 1 篇 indiana univ blo...
  • 1 篇 inria
  • 1 篇 ist austria klos...
  • 1 篇 fudan univ sch c...
  • 1 篇 univ augsburg d-...
  • 1 篇 univ pisa dipart...
  • 1 篇 indian inst sci ...

作者

  • 3 篇 bagnara r
  • 3 篇 goharshady amir ...
  • 2 篇 cavarra alessand...
  • 2 篇 green paul
  • 2 篇 epps doug
  • 2 篇 schreiber robert...
  • 2 篇 balasa f
  • 2 篇 hedenborg mathia...
  • 2 篇 li li
  • 2 篇 zhang yuantong
  • 2 篇 beyer dirk
  • 2 篇 ragan-kelley jon...
  • 2 篇 chakrabarti dhru...
  • 2 篇 catthoor f
  • 2 篇 kilpatrick charl...
  • 2 篇 parigot didier
  • 2 篇 ghaleb asem
  • 2 篇 joisha pramod g.
  • 2 篇 wang wei
  • 2 篇 lowe welf

语言

  • 129 篇 英文
  • 7 篇 其他
检索条件"主题词=Data-flow Analysis"
136 条 记 录,以下是21-30 订阅
排序:
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static data-flow analysis
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2023年 第4期32卷 82-82页
作者: Cui, Mohan Chen, Chengjun Xu, Hui Zhou, Yangfan Fudan Univ Sch Comp Sci Shanghai Peoples R China Shanghai Key Lab Intelligent Informat Proc Shanghai Peoples R China
Rust is an emerging programming language that aims to prevent memory-safety bugs. However, the current design of Rust also brings side effects, which may increase the risk of memory-safety issues. In particular, it em... 详细信息
来源: 评论
Discovering and understanding android sensor usage behaviors with data flow analysis
收藏 引用
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS 2018年 第1期21卷 105-126页
作者: Liu, Xing Liu, Jiqiang Wang, Wei He, Yongzhong Zhang, Xiangliang Beijing Jiaotong Univ Beijing Key Lab Secur & Privacy Intelligent Trans 3 Shangyuancun Beijing 100044 Peoples R China King Abdullah Univ Sci & Technol Div Comp Elect & Math Sci & Engn Thuwal Saudi Arabia
Today's Android-powered smartphones have various embedded sensors that measure the acceleration, orientation, light and other environmental conditions. Many functions in the third-party applications (apps) need to... 详细信息
来源: 评论
A New Framework for Global Object-oriented data-flow analysis
A New Framework for Global Object-oriented Data-flow Analysi...
收藏 引用
IEEE BEIJING SECTION(跨国电气电子工程师学会北京分会)
作者: XU Xiong,XU Guo-ai,ZHANG Miao Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing 100876,China ZHUO Xin-jian School of Science Beijing University of Posts and Telecommunications Beijing 100876,China
conventional data-flow analysis technology has many disadvantages when applied to OOPL for the polymorphism,generic,and other special *** paper analyzes these disadvantages,and based on which,a new dataflow analysis f... 详细信息
来源: 评论
Exploring Sensor Usage Behaviors of Android Applications Based on data flow analysis  34
Exploring Sensor Usage Behaviors of Android Applications Bas...
收藏 引用
34th IEEE International Performance, Computing, and Communications Conference (lPCCC)
作者: Liu, Xing Liu, Jiqiang Wang, Wei Beijing Jiaotong Univ Sch Comp & Informat Technol Beijing 100044 Peoples R China
Today's Android-powered smartphones are equipped with various embedded sensors, such as the motion sensors, the environmental sensors and the position sensors. Many functions in the third-party applications (apps)... 详细信息
来源: 评论
data-flow frameworks for worst-case execution time analysis
收藏 引用
REAL-TIME SYSTEMS 2002年 第3期22卷 183-227页
作者: Blieberger, J Vienna Univ Technol Dept Comp Aided Automat A-1040 Vienna Austria
The purpose of this paper is to introduce frameworks based on data-flow equations which estimate the worst-case execution time (WCET) of real-time programs. These frameworks allow several different WCET analysis techn... 详细信息
来源: 评论
CRYPTODY: Cryptographic Misuse analysis of IoT Firmware via data-flow Reasoning  24
CRYPTODY: Cryptographic Misuse Analysis of IoT Firmware via ...
收藏 引用
27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
作者: Wang, Jianing Guo, Shanqing Diao, Wenrui Liu, Yue Duan, Haixin Liu, Yichen Liang, Zhenkai Natl Univ Singapore Singapore Singapore Shandong Univ Jinan Peoples R China Southeast Univ Nanjing Peoples R China QI ANXIN Grp Beijing Peoples R China Tsinghua Univ Beijing Peoples R China Zhongguancun Lab Beijing Peoples R China Quancheng Lab Jinan Peoples R China Indiana Univ Bloomington Bloomington IN USA
Cryptographic techniques form the foundation of the security and privacy of computing solutions. However, if cryptographic APIs are not invoked correctly, they can result in significant security problems. In this pape... 详细信息
来源: 评论
An Incremental Algorithm for Algebraic Program analysis
收藏 引用
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL 2025年 第POPL期9卷 1934-1961页
作者: Zhou, Chenyu Fang, Yuzhou Wang, Jingbo Wang, Chao Univ Southern Calif Los Angeles CA 90007 USA Purdue Univ W Lafayette IN USA
We propose a method for conducting algebraic program analysis (APA) incrementally in response to changes of the program under analysis. APA is a program analysis paradigm that consists of two distinct steps: computing... 详细信息
来源: 评论
Augmenting Interpolation-Based Model Checking with Auxiliary Invariants  30th
Augmenting Interpolation-Based Model Checking with Auxiliary...
收藏 引用
30th International Symposium on Model Checking Software
作者: Beyer, Dirk Chien, Po-Chun Lee, Nian-Ze Ludwig Maximilians Univ Munchen Munich Germany
Software model checking is a challenging problem, and generating relevant invariants is a key factor in proving the safety properties of a program. Program invariants can be obtained by various approaches, including l... 详细信息
来源: 评论
Equivalence analysis: a general technique to improve the efficiency of data-flow analyses in the presence of pointers  99
Equivalence analysis: a general technique to improve the eff...
收藏 引用
Proceedings of the 1999 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering
作者: Donglin Liang Mary Jean Harrold The Ohio State University
Existing methods to handle pointer variables during data-flow analyses can make such analyses inefficient both in time and space because the data-flow analyses must store and propagate large sets of data facts that ar... 详细信息
来源: 评论
Automatic Generation of Interprocedural dataflow Analyzers and Optimizers
收藏 引用
Journal of Computer Science & Technology 2002年 第6期17卷 708-717页
作者: 连瑞奇 张兆庆 乔如良 Institute of Computing Technology The Chinese Academy of Sciences Beijing 100080 P.R. China
Interprocedural analysis and optimization are very important for compilers toexploit parallelism of modern high-performance computer systems. But it is very complicated,easy to make mistakes and difficult to maintain ... 详细信息
来源: 评论