{"id":"https://openalex.org/W2532001921","doi":"https://doi.org/10.1109/nlpke.2011.6138200","title":"Memory errors prevention technology for C/C++ program based on probability","display_name":"Memory errors prevention technology for C/C++ program based on probability","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W2532001921","doi":"https://doi.org/10.1109/nlpke.2011.6138200","mag":"2532001921"},"language":"en","primary_location":{"id":"doi:10.1109/nlpke.2011.6138200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nlpke.2011.6138200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Natural Language Processing and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046818119","display_name":"Jingfeng Xue","orcid":"https://orcid.org/0000-0002-3087-9701"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingfeng Xue","raw_affiliation_strings":["School of Software, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102753688","display_name":"Changzhen Hu","orcid":"https://orcid.org/0000-0002-2711-7060"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changzhen Hu","raw_affiliation_strings":["School of Software, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078152154","display_name":"H. Ren","orcid":"https://orcid.org/0009-0008-8564-9904"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyu Ren","raw_affiliation_strings":["School of Software, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101823328","display_name":"Rui Ma","orcid":"https://orcid.org/0000-0003-1954-5775"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Ma","raw_affiliation_strings":["School of Software, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100402574","display_name":"Jian Li","orcid":"https://orcid.org/0000-0003-1138-7987"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Li","raw_affiliation_strings":["School of Computer, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046818119"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.33863048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"233","last_page":"237"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.8497707843780518},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.815790057182312},{"id":"https://openalex.org/keywords/memory-map","display_name":"Memory map","score":0.6776696443557739},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.5852043628692627},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.5570150017738342},{"id":"https://openalex.org/keywords/flat-memory-model","display_name":"Flat memory model","score":0.49313443899154663},{"id":"https://openalex.org/keywords/demand-paging","display_name":"Demand paging","score":0.48899567127227783},{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.48184525966644287},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4728831648826599},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.46928465366363525},{"id":"https://openalex.org/keywords/interleaved-memory","display_name":"Interleaved memory","score":0.46880462765693665},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.4534547030925751},{"id":"https://openalex.org/keywords/memory-address","display_name":"Memory address","score":0.4534478485584259},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.44123515486717224},{"id":"https://openalex.org/keywords/extended-memory","display_name":"Extended memory","score":0.43996894359588623},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.2955302596092224},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.26726678013801575},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.2529401183128357},{"id":"https://openalex.org/keywords/shared-memory","display_name":"Shared memory","score":0.22813215851783752},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2228439450263977},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.22270113229751587},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20064225792884827}],"concepts":[{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.8497707843780518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.815790057182312},{"id":"https://openalex.org/C74426580","wikidata":"https://www.wikidata.org/wiki/Q719484","display_name":"Memory map","level":3,"score":0.6776696443557739},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.5852043628692627},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.5570150017738342},{"id":"https://openalex.org/C57863822","wikidata":"https://www.wikidata.org/wiki/Q905488","display_name":"Flat memory model","level":4,"score":0.49313443899154663},{"id":"https://openalex.org/C188873839","wikidata":"https://www.wikidata.org/wiki/Q5255045","display_name":"Demand paging","level":5,"score":0.48899567127227783},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.48184525966644287},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4728831648826599},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.46928465366363525},{"id":"https://openalex.org/C63511323","wikidata":"https://www.wikidata.org/wiki/Q908936","display_name":"Interleaved memory","level":4,"score":0.46880462765693665},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.4534547030925751},{"id":"https://openalex.org/C153247305","wikidata":"https://www.wikidata.org/wiki/Q835713","display_name":"Memory address","level":3,"score":0.4534478485584259},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.44123515486717224},{"id":"https://openalex.org/C171675096","wikidata":"https://www.wikidata.org/wiki/Q1143380","display_name":"Extended memory","level":4,"score":0.43996894359588623},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.2955302596092224},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.26726678013801575},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.2529401183128357},{"id":"https://openalex.org/C133875982","wikidata":"https://www.wikidata.org/wiki/Q764810","display_name":"Shared memory","level":2,"score":0.22813215851783752},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2228439450263977},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.22270113229751587},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20064225792884827}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nlpke.2011.6138200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nlpke.2011.6138200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Natural Language Processing and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W145355838","https://openalex.org/W289186455","https://openalex.org/W365644846","https://openalex.org/W760227493","https://openalex.org/W981511308","https://openalex.org/W1484246366","https://openalex.org/W1983505133","https://openalex.org/W1994759706","https://openalex.org/W2121218648","https://openalex.org/W2121563828","https://openalex.org/W2122249806","https://openalex.org/W2140958850","https://openalex.org/W2154795299","https://openalex.org/W2156729262","https://openalex.org/W2170310381","https://openalex.org/W4239120913","https://openalex.org/W4251201460","https://openalex.org/W6605980827","https://openalex.org/W6680708607","https://openalex.org/W6683287478","https://openalex.org/W6685251632"],"related_works":["https://openalex.org/W2519212377","https://openalex.org/W2182829270","https://openalex.org/W4243333834","https://openalex.org/W1913252777","https://openalex.org/W3207425765","https://openalex.org/W2963621223","https://openalex.org/W2954705318","https://openalex.org/W3182691614","https://openalex.org/W2170922286","https://openalex.org/W4210676563"],"abstract_inverted_index":{"Applications":[0],"written":[1],"in":[2,45,58,65],"unsafe":[3],"languages":[4],"like":[5],"C":[6],"and":[7,18,30,77,92,109],"C++":[8],"are":[9],"vulnerable":[10],"to":[11,25],"memory":[12,53,63,74,81,106,111,118],"errors":[13,22,64,107,119],"such":[14],"as":[15],"buffer":[16],"overflows":[17],"dangling":[19],"pointers.":[20],"Such":[21],"can":[23,61],"lead":[24],"program":[26],"crashes,":[27],"security":[28],"vulnerabilities,":[29],"unpredictable":[31],"behavior.":[32],"Aiming":[33],"at":[34],"the":[35,49],"problem,":[36],"PSC,":[37],"a":[38,116],"new":[39],"probabilistic":[40],"safeguard":[41],"C,":[42],"is":[43,56,83,101,115],"proposed":[44],"this":[46],"paper.":[47],"At":[48],"basis":[50],"of":[51],"Diehard,":[52],"allocating":[54,75],"strategy":[55],"improved":[57],"PSC.":[59],"PSC":[60,100],"avoid":[62],"all":[66],"probability":[67],"during":[68],"software":[69],"executing":[70],"by":[71,85],"combing":[72],"random":[73],"algorithm":[76],"virtual":[78],"memory.":[79],"Physical":[80],"consumption":[82],"decreased":[84],"building":[86],"hot":[87],"object":[88],"space":[89],"working":[90],"set":[91],"compressing":[93],"non":[94],"frequently":[95],"used":[96],"objects.":[97],"Experiments":[98],"show":[99],"better":[102],"than":[103],"Diehard":[104],"for":[105],"prevention":[108,120],"physical":[110],"consumption.":[112],"So":[113],"it":[114],"valid":[117],"technology":[121],"based":[122],"on":[123],"probability.":[124]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
