Follow
Oukseh Lee
Oukseh Lee
Nature Mobility Co.
Verified email at naturemobility.com
Title
Cited by
Cited by
Year
Scalable shape analysis for systems code
H Yang, O Lee, J Berdine, C Calcagno, B Cook, D Distefano, P O’Hearn
International Conference on Computer Aided Verification, 385-398, 2008
3302008
Proofs about a folklore let-polymorphic type inference algorithm
O Lee, K Yi
ACM Transactions on Programming Languages and Systems (TOPLAS) 20 (4), 707-723, 1998
1611998
Automatic verification of pointer programs using grammar-based shape analysis
O Lee, H Yang, K Yi
Programming Languages and Systems: 14th European Symposium on Programming …, 2005
1092005
A practical string analyzer by the widening approach
TH Choi, O Lee, H Kim, KG Doh
Asian Symposium on Programming Languages and Systems, 374-388, 2006
682006
Program analysis for overlaid data structures
O Lee, H Yang, R Petersen
Computer Aided Verification: 23rd International Conference, CAV 2011 …, 2011
482011
Applying dataflow analysis to detecting software vulnerability
H Kim, TH Choi, SC Jung, HC Kim, O Lee, KG Doh
2008 10th International conference on advanced communication technology 1 …, 2008
192008
A generalized let-polymorphic type inference algorithm
O Lee, K Yi
Tech. rept. Technical Memorandum ROPAS-2000-5, Research on Program Analysis …, 2000
142000
On scalable shape analysis
H Yang, O Lee, C Calcagno, D Distefano, P O’Hearn
Technical report RR-07-10, Queen Mary, University of London, 2007
132007
Universal string analyzer and method thereof
K Doh, O Lee, T Choi, B Whang, J Chu, S Yoo, S Hong
US Patent App. 11/393,362, 2006
112006
Proofs of a set of hybrid let-polymorphic type inference algorithms
H Eo, O Lee, K Yi
New Generation Computing 22, 1-36, 2004
112004
Inserting safe memory reuse commands into ml-like programs
O Lee, H Yang, K Yi
International Static Analysis Symposium, 171-188, 2003
112003
Experiments on the Effectiveness of an Automatic Insertion of Memory Reuses into ML-like Programs
O Lee, K Yi
Proceedings of the 4th international symposium on Memory management, 97-107, 2004
82004
A proof method for the correctness of modularized 0CFA
O Lee, K Yi, Y Paek
Information Processing Letters 81 (4), 179-185, 2002
82002
Kwangkeun Yi
O Lee
Proofs about a folklore let-polymorphic type inference algorithm. ACM …, 1998
81998
Static insertion of safe and effective memory reuse commands into ML-like programs
O Lee, H Yang, K Yi
Science of Computer Programming 58 (1-2), 141-178, 2005
62005
Rule-Based Source-Code Analysis For Detecting Security Vulnerabilities
H Kim, TH Choi, SC Jung, O Lee, KG Doh, SY Lee
42008
Automatic extraction of semantic relationships from images using ontologies and SVM classifiers
JW Jeong, KW Park, OS Lee, DH Lee
International Workshop on Multimedia Content Analysis and Mining, 184-194, 2007
32007
A Generalization of Hybrid Let-Polymorphic Type Inference Algorithms.
O Lee, K Yi
APLAS, 79-88, 2000
32000
A divide-and-conquer approach for analysing overlaid data structures
O Lee, H Yang, R Petersen
Formal Methods in System Design 41, 4-24, 2012
22012
APROV: Another Program Verifier for Embedded Linux Device Drivers
O Lee, SC Jung, HC Ahn, T Kim
2008 10th International Conference on Advanced Communication Technology 1 …, 2008
22008
The system can't perform the operation now. Try again later.
Articles 1–20