Austin et al., "Efficient Detection of All Pointer and Array Access Errors," ACM Sigplan, document No. 0-89791-662-x/94/0006, pp. 290-301 (1994). |
Boris Beizer, Software Testing Techniques, 2nd Ed., Van Nostrand Reinhold, New York, NY., pp. 59-60, 70-77, 145 and 150-172 (1990). |
Francois Bourdoncle, "Abstract Debugging of Higher-order Imperative Languages," ACM Sigplan, document No. 0-89791-598-4/93/0006/0046, pp. 46-55 (1993). |
Chan et al., "AIDA--A Dynamic Data Flow Anomaly Detection System for Pascal Programs," Software Practice and Experience, vol. 17, No. 3, pp. 227-239 (Mar. 1987). |
Richard A. Eyre-Todd, "The Detection of Dangling References in C++ Programs," ACM Letters on Programming Languages and Systems, vol. 2, Nos. 1-4, pp. 127-133 (Mar.-Dec. 1993). |
Istvan Forgacs, "Double Iterative Framework for Flow-Sensitive Interprocedural Data Flow Analysis," ACM Transactions on Software Engineering and Methodology, vol. 3, No. 1, pp. 29-55 (Jan. 1994). |
Fosdick et al., "Data Flow Analysis in Software Reliability," Computing Surveys, vol. 8, No. 3, pp. 305-330 (Sep. 1976). |
Frankl et al., "An Applicable of Data Flow Testing Criteria," IEEE Transactions of Software Engineering, vol. 14, No. 10, pp. 1483-1498 (Oct. 1988). |
Fritzson et al., "Generalized Algorithmic Debugging and Testing," Proceedings of the ACM Sigplan '91 Conference on Programming Language Design and Implementation, Toronto, Ontario, Canada, pp. 317-326 (Jun. 26-28, 1991). |
Rajiv Gupta, "Optimizing Array Bound Checks Using Flow Analysis," ACM Letters on Programming Languages and Systems, vol. 2, Nos. 1-4, pp. 135-150 (Mar.-Dec. 1993). |
J. C. Huang, "Detection of Data Flow Anomaly Through Program Instrumentation," IEEE Transactions on Software Engineering, vol. SE-5, No. 3, pp. 226-236 (May 1979). |
Bogdan Korel, "Automated Software Test Data Generation," IEEE Transactions on Software Engineering, vol. 16, No. 8, pp. 870-879 (Aug. 1990). |
Laski et al., "A Data Flow Oriented Program Testing Strategy," IEEE Transactions on Software Engineering, vol. SE-9, No. 3, pp. 347-354 (May 1983). |
Ogawa et al., "Anomaly Detection of Functional Programs Based on Global Dataflow Analysis,"Systems and Computers in Japan, vol. 21, No. 2, pp. 11-22 (1990). |