Maintenance activities are made more difficult when pointers are heavily used in source code. the programmer needs to build a mental model of memory locations and of the way they are accessed by means of pointers, in order to comprehend the functionalities of the system. Although several points-to analysis algorithms have been proposed in literature to provide information about memory locations referenced by pointers, there are no quantitative evaluations of the impact of pointers on the overall program understanding activities. Program comprehension activities are usually supported by tools, providing suitable views of the source program. One of the most widely used code views is the Call Graph, a graph representing calls between fun...
Pointer analysis, as a fundamental research, is to identify the possible runtime values of a pointer...
Abstract. In order to analyze programs that manipulate pointers, it is necessary to have safe inform...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/19...
The use of pointers presents serious problems for software productivity tools for software understan...
The use of pointers creates serious problems for optimizing compilers and software engineering tools...
The use of pointers presents serious problems for soft-ware productivity tools for software understa...
Since the C language imposes little restriction on the use of function pointers, the task of call gr...
Pointer analysis is a fundamental static program analysis, with a rich literature and wide applicati...
Interprocedural analysis requires a statically determinable call multigraph to represent the program...
Interprocedural analysis requires a statically determinable call multigraph to represent the program...
Real world programs (in languages like C) heavily make use of pointers. Program understanding activi...
Many powerful code optimization techniques rely on accurate information connecting the definitions a...
This dissertation presents a pointer analysis for Java programs, together with several practical ana...
Pointer analysis has recently been a subject of active research. The focus of most techniques is on:...
Oftentimes, developers need to understand a software system they are unfamiliar with, for instance, ...
Pointer analysis, as a fundamental research, is to identify the possible runtime values of a pointer...
Abstract. In order to analyze programs that manipulate pointers, it is necessary to have safe inform...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/19...
The use of pointers presents serious problems for software productivity tools for software understan...
The use of pointers creates serious problems for optimizing compilers and software engineering tools...
The use of pointers presents serious problems for soft-ware productivity tools for software understa...
Since the C language imposes little restriction on the use of function pointers, the task of call gr...
Pointer analysis is a fundamental static program analysis, with a rich literature and wide applicati...
Interprocedural analysis requires a statically determinable call multigraph to represent the program...
Interprocedural analysis requires a statically determinable call multigraph to represent the program...
Real world programs (in languages like C) heavily make use of pointers. Program understanding activi...
Many powerful code optimization techniques rely on accurate information connecting the definitions a...
This dissertation presents a pointer analysis for Java programs, together with several practical ana...
Pointer analysis has recently been a subject of active research. The focus of most techniques is on:...
Oftentimes, developers need to understand a software system they are unfamiliar with, for instance, ...
Pointer analysis, as a fundamental research, is to identify the possible runtime values of a pointer...
Abstract. In order to analyze programs that manipulate pointers, it is necessary to have safe inform...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/19...