메뉴 건너뛰기




Volumn , Issue , 2010, Pages 151-160

A 2-phase method for validation of matching pair property with case studies of operating systems

Author keywords

Cross cutting semantics; Memory leaks; Program analysis; Synchronization; Validation

Indexed keywords

ACCURATE ANALYSIS; CONTROL FLOWS; CROSS-CUTTING; CROSS-CUTTING SEMANTICS; EXECUTION PATHS; LINUX KERNEL; MEMORY LEAKS; OPERATING SYSTEMS; PHASE METHODS; PRACTICAL METHOD; PROGRAM ANALYSIS; RELEVANT EXECUTION PATH; VALIDATION;

EID: 79952018968     PISSN: 10719458     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSRE.2010.40     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 1
    • 72749095310 scopus 로고    scopus 로고
    • The Ariane 5 software failure
    • M. Dowson, "The Ariane 5 software failure," SIGSOFT Softw. Eng. Notes, vol. 22, no. 2, p. 84, 1997.
    • (1997) SIGSOFT Softw. Eng. Notes , vol.22 , Issue.2 , pp. 84
    • Dowson, M.1
  • 2
    • 35448996514 scopus 로고    scopus 로고
    • Practical memory leak detection using guarded value-flow analysis
    • S. Cherem, L. Princehouse, and R. Rugina, "Practical memory leak detection using guarded value-flow analysis," SIGPLAN Not., vol. 42, no. 6, pp. 480-491, 2007.
    • (2007) SIGPLAN Not. , vol.42 , Issue.6 , pp. 480-491
    • Cherem, S.1    Princehouse, L.2    Rugina, R.3
  • 5
    • 0020736536 scopus 로고
    • Complexity of analyzing the synchronization structure of concurrent programs
    • R. N. Taylor, "Complexity of analyzing the synchronization structure of concurrent programs," Acta Informatica, vol. 19, no. 1, pp. 57-84, 1983.
    • (1983) Acta Informatica , vol.19 , Issue.1 , pp. 57-84
    • Taylor, R.N.1
  • 6
    • 84888548305 scopus 로고    scopus 로고
    • "Klocwork k7," http://www.klocwork.com/.
    • Klocwork K7
  • 7
    • 47249162470 scopus 로고    scopus 로고
    • "Coverity prevent," http://www.coverity.com/products/coverity- prevent.html.
    • Coverity Prevent
  • 9
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • Jan/Feb
    • D. Evans and D. Larochelle, "Improving security using extensible lightweight static analysis," Software, IEEE, vol. 19, no. 1, pp. 42-51, Jan/Feb 2002.
    • (2002) Software, IEEE , vol.19 , Issue.1 , pp. 42-51
    • Evans, D.1    Larochelle, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.