Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,115,093 papers from all fields of science
Search
Sign In
Create Free Account
Dereference operator
Known as:
Dereference
, Indirection lookup
, Indirection operator
Expand
The dereference operator or indirection operator, denoted by "*" (i.e. an asterisk), is a unary operator found in C-like languages that include…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
BCPL
C syntax
C++
Dangling pointer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
State Consistency Checking for Non-reentrant Function Based on Taint Assisted Symbol Execution
Bo Yu
,
Qiang Yang
,
Congxi Song
Lecture Notes of the Institute for Computer…
2019
Corpus ID: 199017320
Non-reentrant functions are commonly used in multi-thread programs, such as network services and other event-driven programs, to…
Expand
2011
2011
Bernstein's Conditions
P. Feautrier
Encyclopedia of Parallel Computing
2011
Corpus ID: 38902751
1 Definition Bersntein's conditions [4] are a simple test for deciding if statements or operations can be interchanged without…
Expand
2008
2008
Verifying the Safety of User Pointer Dereferences
Suhabe Bugrara
,
A. Aiken
IEEE Symposium on Security and Privacy
2008
Corpus ID: 10112986
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system…
Expand
2004
2004
A novel processor architecture with exact tag-free pointers
M. Meyer
IEEE Micro
2004
Corpus ID: 7018082
Along with the success of Java, garbage collection advances to embedded and real-time systems. In this paper a novel RISC…
Expand
Highly Cited
2003
Highly Cited
2003
MECA: an extensible, expressive system and language for statically checking security properties
Junfeng Yang
,
Theodore Kremenek
,
Yichen Xie
,
D. Engler
Conference on Computer and Communications…
2003
Corpus ID: 252049
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for…
Expand
1996
1996
An Inference Algorithm for the Static Verification of Pointer Manipulation
Pascal Fradet
,
R. Gaugne
,
D. L. Métayer
1996
Corpus ID: 51299432
The incorrect use of pointers is one of the most common source of bugs. As a consequence, any kind of static code checking…
Expand
Review
1993
Review
1993
Object Storage Management Architectures
A. Biliris
,
Jack A. Orenstein
NATO ASI OODBS
1993
Corpus ID: 15688812
This paper examines the architectural issues in building storage systems for object-oriented database management systems (OODBMSs…
Expand
1992
1992
An object-oriented refinement calculus with modular reasoning
Barry Mark Utting
1992
Corpus ID: 61202181
In this thesis, the refinement calculus is extended to support a variety of object-oriented programming styles. The late binding…
Expand
1990
1990
Uniform Object Management
G. Copeland
,
M. Franklin
,
G. Weikum
International Conference on Extending Database…
1990
Corpus ID: 5309390
Most real-world applications require a capability for both general-purpose programming and database transactions on persistent…
Expand
1990
1990
An Abstract Machine to Implement OR-AND Parallel Prolog Efficiently
J. C. D. Kergommeaux
,
Philippe Robert
The Journal of Logic Programming
1990
Corpus ID: 205115558
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required