Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- columnDecember 2018
Reasoning About Reference Behavior with RESOLVE
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 43, Issue 3Pages 18–19https://doi.org/10.1145/3229783.3229800As an alternative to reasoning about references explicitly and ACM SIGSOFT Software Engineering Notes Page 18 July 2018 Volume 43 Number 3 routinely as needed for Java-like programs, this paper summarizes the RESOLVE approach in reasoning via reference-...
- research-articleOctober 2013
On the simplicity of synthesizing linked data structure operations
GPCE '13: Proceedings of the 12th international conference on Generative programming: concepts & experiencesPages 155–158https://doi.org/10.1145/2517208.2517225We argue that synthesizing operations on recursive linked data structures is not as hard as it appears and is, in fact, within reach of current SAT-based synthesis techniques - with the addition of a simple approach that we describe to decompose the ...
Also Published in:
ACM SIGPLAN Notices: Volume 49 Issue 3 - ArticleJanuary 2012
The location linking concept: a basis for verification of code using pointers
- Gregory Kulczycki,
- Hampton Smith,
- Heather Harton,
- Murali Sitaraman,
- William F. Ogden,
- Joseph E. Hollingsworth
VSTTE'12: Proceedings of the 4th international conference on Verified Software: theories, tools, experimentsPages 34–49https://doi.org/10.1007/978-3-642-27705-4_4While the use of pointers can be minimized by language mechanisms for data abstraction, alias avoidance and control, and disciplined software development techniques, ultimately, any verifying compiler effort must be able to verify code that makes use of ...
- ArticleOctober 2009
Automatic restructuring of linked data structures
LCPC'09: Proceedings of the 22nd international conference on Languages and Compilers for Parallel ComputingPages 263–277https://doi.org/10.1007/978-3-642-13374-9_18The memory subsystem is one of the major performance bottlenecks in modern computer systems. While much effort is spent on the optimization of codes which access data regularly, not all codes will do so. Programs using pointer linked data structures are ...
- articleDecember 2004
Tolerating memory latency through push prefetching for pointer-intensive applications
ACM Transactions on Architecture and Code Optimization (TACO), Volume 1, Issue 4Pages 445–475https://doi.org/10.1145/1044823.1044827Prefetching is often used to overlap memory latency with computation for array-based applications. However, prefetching for pointer-intensive applications remains a challenge because of the irregular memory access pattern and pointer-chasing problem. In ...
- research-articleMarch 1994
Orientation-Based Differential Geometric Representations for Computer Vision Applications
IEEE Transactions on Pattern Analysis and Machine Intelligence (ITPM), Volume 16, Issue 3Pages 249–258https://doi.org/10.1109/34.276124Orientation-based representations (OBR's) have many advantages. Three orientation-based differential geometric representations in computer vision literature are critically examined. The three representations are the extended Gaussian image (EGI), the ...
- research-articleNovember 1989
Local Concurrent Error Detection and Correction in Data Structures Using Virtual Backpointers
IEEE Transactions on Computers (ITCO), Volume 38, Issue 11Pages 1481–1492https://doi.org/10.1109/12.42119Two linked data structures utilizing virtual backpointers, the virtual double-linked list (VDLL) and the B-tree with virtual backpointers (VBT), are described. Four experiments that provide example measurements of the capabilities (behavior under ...