Scalable shape analysis for systems code H Yang, O Lee, J Berdine, C Calcagno, B Cook, D Distefano, P O’Hearn International Conference on Computer Aided Verification, 385-398, 2008 | 330 | 2008 |
Proofs about a folklore let-polymorphic type inference algorithm O Lee, K Yi ACM Transactions on Programming Languages and Systems (TOPLAS) 20 (4), 707-723, 1998 | 163 | 1998 |
Automatic verification of pointer programs using grammar-based shape analysis O Lee, H Yang, K Yi Programming Languages and Systems: 14th European Symposium on Programming …, 2005 | 109 | 2005 |
A practical string analyzer by the widening approach TH Choi, O Lee, H Kim, KG Doh Asian Symposium on Programming Languages and Systems, 374-388, 2006 | 68 | 2006 |
Program analysis for overlaid data structures O Lee, H Yang, R Petersen Computer Aided Verification: 23rd International Conference, CAV 2011 …, 2011 | 48 | 2011 |
Applying dataflow analysis to detecting software vulnerability H Kim, TH Choi, SC Jung, HC Kim, O Lee, KG Doh 2008 10th International conference on advanced communication technology 1 …, 2008 | 20 | 2008 |
A generalized let-polymorphic type inference algorithm O Lee, K Yi Tech. rept. Technical Memorandum ROPAS-2000-5, Research on Program Analysis …, 2000 | 15 | 2000 |
On scalable shape analysis H Yang, O Lee, C Calcagno, D Distefano, P O’Hearn Technical report RR-07-10, Queen Mary, University of London, 2007 | 13 | 2007 |
Universal string analyzer and method thereof K Doh, O Lee, T Choi, B Whang, J Chu, S Yoo, S Hong US Patent App. 11/393,362, 2006 | 11 | 2006 |
Proofs of a set of hybrid let-polymorphic type inference algorithms H Eo, O Lee, K Yi New Generation Computing 22, 1-36, 2004 | 11 | 2004 |
Inserting safe memory reuse commands into ml-like programs O Lee, H Yang, K Yi International Static Analysis Symposium, 171-188, 2003 | 11 | 2003 |
Experiments on the Effectiveness of an Automatic Insertion of Memory Reuses into ML-like Programs O Lee, K Yi Proceedings of the 4th international symposium on Memory management, 97-107, 2004 | 8 | 2004 |
A proof method for the correctness of modularized 0CFA O Lee, K Yi, Y Paek Information Processing Letters 81 (4), 179-185, 2002 | 8 | 2002 |
Kwangkeun Yi O Lee Proofs about a folklore let-polymorphic type inference algorithm. ACM …, 1998 | 8 | 1998 |
Static insertion of safe and effective memory reuse commands into ML-like programs O Lee, H Yang, K Yi Science of Computer Programming 58 (1-2), 141-178, 2005 | 6 | 2005 |
Rule-Based Source-Code Analysis For Detecting Security Vulnerabilities H Kim, TH Choi, SC Jung, O Lee, KG Doh, SY Lee | 4 | 2008 |
Automatic extraction of semantic relationships from images using ontologies and SVM classifiers JW Jeong, KW Park, OS Lee, DH Lee International Workshop on Multimedia Content Analysis and Mining, 184-194, 2007 | 3 | 2007 |
A Generalization of Hybrid Let-Polymorphic Type Inference Algorithms. O Lee, K Yi APLAS, 79-88, 2000 | 3 | 2000 |
A divide-and-conquer approach for analysing overlaid data structures O Lee, H Yang, R Petersen Formal Methods in System Design 41, 4-24, 2012 | 2 | 2012 |
APROV: Another Program Verifier for Embedded Linux Device Drivers O Lee, SC Jung, HC Ahn, T Kim 2008 10th International Conference on Advanced Communication Technology 1 …, 2008 | 2 | 2008 |