Access-Based Localization with Bypassing
نویسندگان
چکیده
We present an extension of access-based localization technique to mitigate a substantial inefficiency in handling procedure calls. Recently, access-based localization was proposed as an effective way of tightly localizing abstract memories. However, it has a limitation in handling procedure calls: the localized input memory for a procedure contains not only memory locations accessed by the procedure but also those accessed by transitively called procedures. The weakness is especially exacerbated in the presence of recursive call cycles, which is common in analysis of realistic programs. In this paper, we present a technique, called bypassing, that mitigates the problem. Our technique localizes input memory states only with memory locations that the procedure directly accesses. Those parts not involved in analysis of the procedure are bypassed to transitively called procedures. In experiments with an industrial-strength global C static analyzer, the technique reduces the average analysis time by 42%. In particular, the technique is especially effective for programs that extensively use recursion: it saves analysis time by 77% on average.
منابع مشابه
Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networks
Nowadays, since wireless sensor networks (WSN)s are increasingly being used in challenged environments such as underground mines, tunnels, oceans and the outer space, fault-tolerance need has become a major requirement for routing protocols. So far, the proposed fault-tolerance methods or algorithms aim to recover the isolated failures which occur different parts of the network in different tim...
متن کاملThe First Discrete Choice Experiment On Usage of Bypassing Agents in Hemophilic Patients in Iran
Background: Bleeding events in hemophilic patients with inhibitors are managed by bypassing agents. Currently available agents in Iran are recombinant activated factor VII (rfVIIa; Aryogen, Aryoseven) and Feiba (factor eight inhibitor bypassing agent). No standardized and accurate assay is currently available for monitoring the effectiveness of bypassing agents. We suggested that history of the...
متن کاملA Survey of Cache Bypassing Techniques
With increasing core-count, the cache demand of modern processors has also increased. However, due to strict area/power budgets and presence of poor data-locality workloads, blindly scaling cache capacity is both infeasible and ineffective. Cache bypassing is a promising technique to increase effective cache capacity without incurring power/area costs of a larger sized cache. However, injudicio...
متن کاملCost Components of Treatment Protocols of Haemophilia Patients with Inhibitors using Bypassing Agents in Iran
Bypassing agents are the most commonly used medicines for the treatment of hemophilia patients with inhibitors. The aim of this study is to identify the cost components of management of bleeding vents in hemophilia patients with inhibitors in Iran. This study is a cross-sectional study using a bottom-up approach to determine the cost components of treatment of hemophilia patients with inh...
متن کاملBypassing birthing centres for child birth: a community-based study in rural Chitwan Nepal
BACKGROUND Child delivery in a health facility is important to reduce maternal mortality. Bypassing nearby birthing facility to deliver at a hospital is common in developing countries including Nepal. Very little is known about the extent and determinants of bypassing the birthing centres in Nepal. This study measures the status of bypassing, characteristics of bypassers and their reasons for b...
متن کامل