نتایج جستجو برای: control flow graph cfg

تعداد نتایج: 1924486  

Reducing the settlements of soft foundation effectively is a critical problem of high-speed railway construction in China. The new CFG pile-slab structure composite foundation is a ground treatment technique which is applied on CFG pile foundation and pile-slab structure composite foundation. Based on the experience of constructing Beijing-Shanghai high-speed railway in China, the settlement-co...

Journal: :CoRR 2015
Mohammed Bekkouche

A model checker can produce a trace of counterexample, for an erroneous program, which is often long and difficult to understand. In general, the part about the loops is the largest among the instructions in this trace. This makes the location of errors in loops critical, to analyze errors in the overall program. In this paper, we explore the scalability capabilities of LocFaults, our error loc...

Journal: :CoRR 2015
Mohammed Bekkouche Hélène Collavizza Michel Rueher

Dans cet exposé, nous présentons notre algorithme amélioré [1] de localisation d’erreurs à partir de contreexemples, LocFaults, basé sur la programmation par contraintes et dirigé par les flots. Cet algorithme analyse les chemins du CFG (Control Flow Graph) du programme erroné pour calculer les sous-ensembles d’instructions suspectes permettant de corriger le programme. En effet, nous générons ...

At present, reducing subgrade settlement of soft soil foundation is a key problem in high-speed railway construction. Pile-slab structure is a widely-utilized form of foundation structure to reduce the subgrade settlement in China. In order to save the engineering cost for high-speed railway construction in developing countries, the author developed a pile-slab structure and named it as the new...

Journal: :Computers & Security 2015
Shahid Alam R. Nigel Horspool Issa Traoré Ibrahim Sogukpinar

Metamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general malware writers reuse old malware. To hide detection the malware writers change the obfuscations (syntax) more than the behavior (semantic) of such a new malware. On this assumption and motivation, this paper presents a new framework named MARD...

Journal: :Transactions of the Society of Instrument and Control Engineers 1984

Journal: :Information & Software Technology 1995
Klaas van den Berg Pim van den Broek

In this paper, the static analysis of programs in the functional programming language Miranda* is described based on two graph models. A new control-flow graph model of Miranda definitions is presented, and a model with four classes of caligraphs. Standard software metrics are applicable to these models. A Miranda front end for Prometrixt, a tool for the automated analysis of flowgraphs and cal...

Journal: :IEICE Transactions on Information and Systems 2010

1994
Chris J. Newburn Derek B. Noonburg John Paul Shen

This paper explores the potential of a program representation called the program dependence graph (PDG) for representing and exposing programs’ hierarchical control dependence structure. It presents several extensions to current PDG designs, including a node labeling scheme that simplifies and generalizes PDG traversal. A post-pass PDG-based tool called PEDIGREE has been implemented. It is used...

Journal: :IEEE Access 2022

The software engineering community is working to develop reliable metrics improve quality. It estimated that understanding the source code accounts for 60% of maintenance effort. Cognitive informatics important in quantifying degree difficulty or efforts made by developers understand code. Several empirical studies were conducted 2003 assign cognitive weights each possible basic control structu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید