Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,322 papers from all fields of science
Search
Sign In
Create Free Account
Control flow analysis
Known as:
Uniform k-CFA
, K-CFA
, CFA
Expand
In computer science, control flow analysis (CFA) is a static code analysis technique for determining the control flow of a program. The control flow…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Abstract interpretation
Computer science
Control flow
Control flow diagram
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Optimization methods for the fault injection tool SEInjector
Xiankai Meng
,
QingPing Tan
,
Z. Shao
,
N. Zhang
,
Jianjun Xu
,
-Haoyu Zhang
International Congress on Information and…
2018
Corpus ID: 13717962
In the space environment, computer is easily affected by high-energy particle irradiation, which may incur transient faults, also…
Expand
2015
2015
Time-Triggered Runtime Verification of Component-Based Multi-core Systems
Samaneh Navabpour
,
Borzoo Bonakdarpour
,
S. Fischmeister
Runtime Verification
2015
Corpus ID: 26295984
In this paper, we characterize and solve the problem of augmenting a component-based system with time-triggered runtime…
Expand
2014
2014
Personalized Book Recommendation Based on Ontology and CollaborativeFiltering Algorithm
Lin Cui
,
Hong Li
,
Caiyin Wang
,
Baosheng Yang
2014
Corpus ID: 2686671
Information recommendation service is one of important functions of digital library, aiming at the problem that book…
Expand
2011
2011
A Model-Driven Framework for Aspect Weaver Construction
Suman Roychoudhury
,
J. Gray
,
F. Jouault
LNCS Trans. Aspect Oriented Softw. Dev.
2011
Corpus ID: 16470870
Aspect orientation has been used to improve the modularization of crosscutting concerns that emerge at different levels of…
Expand
2008
2008
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Peng Li
,
Hyundo Park
,
Debin Gao
,
Jianming Fu
Asia-Pacific Computer Systems Architecture…
2008
Corpus ID: 7745160
Host-based anomaly detectors monitor the control-flow and data-flow behavior of system calls to detect intrusions. Control-flow…
Expand
2007
2007
Low Runtime-Overhead Software Synthesis for Communicating Concurrent Processes
Youngchul Cho
,
N. Zergainoh
,
Kiyoung Choi
,
A. Jerraya
RSP
2007
Corpus ID: 134344
Modeling a system with communicating concurrent processes is an effective way of exposing parallelism inherent in the application…
Expand
2006
2006
Control-Flow Analysis and Representation for Aspect-Oriented Programs
Jianjun Zhao
International Conference on Quality Software
2006
Corpus ID: 8707084
Aspect-oriented programming (AOP) has been proposed as a technique for improving the separation of concerns in software design…
Expand
2004
2004
A dynamic compiler for embedded Java virtual machines
M. Debbabi
,
Abdelouahed Gherbi
,
+4 authors
Sami Zhioua
Principles and Practice of Programming in Java
2004
Corpus ID: 2475179
The analgesic effect of zomepirac is potentiated by simultaneously or sequentially administering to a subject suffering from pain…
Expand
1998
1998
Representing the impact of time on human error and systems failure
Chris W. Johnson
Interacting with computers
1998
Corpus ID: 206109501
1991
1991
BAL/SRW: Assembler re-engineering workbench
W. Kozaczynski
,
ES Liongosari
,
JQ Ning
1991
Corpus ID: 62207426
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE