Oukseh Lee
Oukseh Lee
Nature Mobility Co.
Verified email at
Cited by
Cited by
Scalable shape analysis for systems code
H Yang, O Lee, J Berdine, C Calcagno, B Cook, D Distefano, P O’Hearn
International Conference on Computer Aided Verification, 385-398, 2008
Proofs about a folklore let-polymorphic type inference algorithm
O Lee, K Yi
ACM Transactions on Programming Languages and Systems (TOPLAS) 20 (4), 707-723, 1998
Automatic verification of pointer programs using grammar-based shape analysis
O Lee, H Yang, K Yi
Programming Languages and Systems: 14th European Symposium on Programming …, 2005
A practical string analyzer by the widening approach
TH Choi, O Lee, H Kim, KG Doh
Asian Symposium on Programming Languages and Systems, 374-388, 2006
Program analysis for overlaid data structures
O Lee, H Yang, R Petersen
Computer Aided Verification: 23rd International Conference, CAV 2011 …, 2011
Applying dataflow analysis to detecting software vulnerability
H Kim, TH Choi, SC Jung, HC Kim, O Lee, KG Doh
2008 10th International conference on advanced communication technology 1 …, 2008
A generalized let-polymorphic type inference algorithm
O Lee, K Yi
Tech. rept. Technical Memorandum ROPAS-2000-5, Research on Program Analysis …, 2000
On scalable shape analysis
H Yang, O Lee, C Calcagno, D Distefano, P O’Hearn
Technical report RR-07-10, Queen Mary, University of London, 2007
Universal string analyzer and method thereof
K Doh, O Lee, T Choi, B Whang, J Chu, S Yoo, S Hong
US Patent App. 11/393,362, 2006
Proofs of a set of hybrid let-polymorphic type inference algorithms
H Eo, O Lee, K Yi
New Generation Computing 22, 1-36, 2004
Inserting safe memory reuse commands into ml-like programs
O Lee, H Yang, K Yi
International Static Analysis Symposium, 171-188, 2003
Experiments on the Effectiveness of an Automatic Insertion of Memory Reuses into ML-like Programs
O Lee, K Yi
Proceedings of the 4th international symposium on Memory management, 97-107, 2004
A proof method for the correctness of modularized 0CFA
O Lee, K Yi, Y Paek
Information Processing Letters 81 (4), 179-185, 2002
Kwangkeun Yi
O Lee
Proofs about a folklore let-polymorphic type inference algorithm. ACM …, 1998
Static insertion of safe and effective memory reuse commands into ML-like programs
O Lee, H Yang, K Yi
Science of Computer Programming 58 (1-2), 141-178, 2005
Rule-Based Source-Code Analysis for Detecting Security Vulnerabilities
H Kim, TH Choi, SC Jung, O Lee, KG Doh, SY Lee
Automatic extraction of semantic relationships from images using ontologies and SVM classifiers
JW Jeong, KW Park, OS Lee, DH Lee
International Workshop on Multimedia Content Analysis and Mining, 184-194, 2007
A Generalization of Hybrid Let-Polymorphic Type Inference Algorithms.
O Lee, K Yi
APLAS, 79-88, 2000
A divide-and-conquer approach for analysing overlaid data structures
O Lee, H Yang, R Petersen
Formal Methods in System Design 41, 4-24, 2012
APROV: Another Program Verifier for Embedded Linux Device Drivers
O Lee, SC Jung, HC Ahn, T Kim
2008 10th International Conference on Advanced Communication Technology 1 …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20