In an earlier paper, the authors have defined type 1 and type 2 data flow anomalies to be, respectively, the reference to an undefined variable and the definition of a variable without subsequent reference. It is not difficult to devise search techniques to detect such anomalies when the anomalous data flow is contained in a single procedure. When the data flow crosses procedure boundaries, however, many difficulties may arise. In this paper, we carefully define the conditions under which inter-procedural anomalies occur. We also show how algorithms currently used in global program optimization can easily be adapted to yield highly efficient algorithms for the detection of such inter-procedural anomalies
In this article, we address the problem of not only id entifying phenomena, but also attributing the...
The analysis of control flow Involves figuring out where returns will go. How this may be done With ...
. Data-flow analysis algorithms can be classified into two categories: flow-sensitive and flow-inse...
Algorithms are presented for detecting errors and anomalies in programs which use synchronization co...
200 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1977.U of I OnlyRestricted to the ...
An approach to the analysis of concurrent software is discussed. The approach, called anomaly detect...
This technical report surveys recent work in the area of interprocedural data flow analysis. We summ...
We present an interprocedural generalization of the well-known (intraprocedural) Coincidence Theorem...
An unfortunate characteristic of current static analysis algorithms is their apparent inability to d...
Inconsistency or Anomaly extraction refers to the automatically finding a large set of flows observe...
The data deluge has created a great challenge for data mining applications wherein the rare topics o...
Recent research has shown positive outcomes in using the A-Distance metric to evaluate the current s...
Detection of Data Flow Anomalies There are static or dynamic methods to detect data flow anomalies i...
An approach to the analysis of HAL/S software is discussed. The approach, called anomaly detection, ...
Anomaly detection is a huge fi\u80eld of research focused on the task of \u80finding weird or outlyi...
In this article, we address the problem of not only id entifying phenomena, but also attributing the...
The analysis of control flow Involves figuring out where returns will go. How this may be done With ...
. Data-flow analysis algorithms can be classified into two categories: flow-sensitive and flow-inse...
Algorithms are presented for detecting errors and anomalies in programs which use synchronization co...
200 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1977.U of I OnlyRestricted to the ...
An approach to the analysis of concurrent software is discussed. The approach, called anomaly detect...
This technical report surveys recent work in the area of interprocedural data flow analysis. We summ...
We present an interprocedural generalization of the well-known (intraprocedural) Coincidence Theorem...
An unfortunate characteristic of current static analysis algorithms is their apparent inability to d...
Inconsistency or Anomaly extraction refers to the automatically finding a large set of flows observe...
The data deluge has created a great challenge for data mining applications wherein the rare topics o...
Recent research has shown positive outcomes in using the A-Distance metric to evaluate the current s...
Detection of Data Flow Anomalies There are static or dynamic methods to detect data flow anomalies i...
An approach to the analysis of HAL/S software is discussed. The approach, called anomaly detection, ...
Anomaly detection is a huge fi\u80eld of research focused on the task of \u80finding weird or outlyi...
In this article, we address the problem of not only id entifying phenomena, but also attributing the...
The analysis of control flow Involves figuring out where returns will go. How this may be done With ...
. Data-flow analysis algorithms can be classified into two categories: flow-sensitive and flow-inse...