Reachability analysis of program variables
Đ Nikolić, F Spoto - ACM Transactions on Programming Languages and …, 2014 - dl.acm.org
Reachability from a program variable v to a program variable w states that from v, it is
possible to follow a path of memory locations that leads to the object bound to w. We present …
possible to follow a path of memory locations that leads to the object bound to w. We present …
Verified resource guarantees for heap manipulating programs
Program properties that are automatically inferred by static analysis tools are generally not
considered to be completely trustworthy, unless the tool implementation or the results are …
considered to be completely trustworthy, unless the tool implementation or the results are …
Reachability-based acyclicity analysis by abstract interpretation
S Genaim, D Zanardini - Theoretical Computer Science, 2013 - Elsevier
In programming languages with dynamic use of memory, such as Java, knowing that a
reference variable x points to an acyclic data structure is valuable for the analysis of …
reference variable x points to an acyclic data structure is valuable for the analysis of …
Inference of field-sensitive reachability and cyclicity
D Zanardini, S Genaim - ACM Transactions on Computational Logic …, 2014 - dl.acm.org
In heap-based languages, knowing that a variable x points to an acyclic data structure is
useful for analyzing termination. This information guarantees that the depth of the data …
useful for analyzing termination. This information guarantees that the depth of the data …
[HTML][HTML] Field-sensitive sharing
D Zanardini - Journal of logical and algebraic methods in …, 2018 - Elsevier
In static analysis of programming languages with dynamic memory, sharing analysis tries to
infer if two variables point to data structures which are not disjoint. Ie, two variables share at …
infer if two variables point to data structures which are not disjoint. Ie, two variables share at …
Automatic inference of bounds on resource consumption
In this tutorial paper, we overview the techniques that underlie the automatic inference of
resource consumption bounds. We first explain the basic techniques on a Java-like …
resource consumption bounds. We first explain the basic techniques on a Java-like …
Modular termination analysis of java bytecode and its application to phoneME core libraries
Termination analysis has received considerable attention, traditionally in the context of
declarative programming and, recently, also for imperative and Object Oriented (OO) …
declarative programming and, recently, also for imperative and Object Oriented (OO) …
A General Framework for Constraint-Based Static Analyses of Java Bytecode Programs
D Nikolic - 2013 - iris.univr.it
The present thesis introduces a generic parameterized framework for static analysis of Java
bytecode programs, based on constraint generation and solving. This framework is able to …
bytecode programs, based on constraint generation and solving. This framework is able to …
[PDF][PDF] Inference of Field-Dependent Cyclicity
D Zanardini, S Genaim - arXiv preprint arXiv:1306.6526, 2013 - researchgate.net
In general, if acyclicity cannot be proved, then no termination can be guaranteed in such
situations. However, sometimes it may be possible, even without proving acyclicity, to …
situations. However, sometimes it may be possible, even without proving acyclicity, to …
[PDF][PDF] Advanced Topics in Resource Analysis: Certification, Incrementality, Concurrency and Array-Sensitivity
GR Dıez - 2012 - oa.upm.es
Resource Analysis (aka Cost Analysis) tries to approximate the cost of executing programs
by means of cost functions on their input data sizes without actually having to execute the …
by means of cost functions on their input data sizes without actually having to execute the …