When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Memory safety - Wikipedia

    en.wikipedia.org/wiki/Memory_safety

    Memory leak – when memory usage is not tracked or is tracked incorrectly Stack exhaustion – occurs when a program runs out of stack space, typically because of too deep recursion . A guard page typically halts the program, preventing memory corruption, but functions with large stack frames may bypass the page.

  3. Memory leak - Wikipedia

    en.wikipedia.org/wiki/Memory_leak

    Memory leak. In computer science, a memory leak is a type of resource leak that occurs when a computer program incorrectly manages memory allocations [ 1 ] in a way that memory which is no longer needed is not released. A memory leak may also happen when an object is stored in memory but cannot be accessed by the running code (i.e. unreachable ...

  4. Lapsed listener problem - Wikipedia

    en.wikipedia.org/wiki/Lapsed_listener_problem

    In computer programming, the lapsed listener problem is a common source of memory leaks for object-oriented programming languages, among the most common ones for garbage collected languages. [1] It originates in the observer pattern, where observers (or listeners) register with a subject (or publisher) to receive events. In basic implementation ...

  5. List of tools for static code analysis - Wikipedia

    en.wikipedia.org/wiki/List_of_tools_for_static...

    Python. PyCharm – Cross-platform Python IDE with code inspections available for analyzing code on-the-fly in the editor and bulk analysis of the whole project. PyDev – Eclipse-based Python IDE with code analysis available on-the-fly in the editor or at save time. Pylint – Static code analyzer.

  6. Dangling pointer - Wikipedia

    en.wikipedia.org/wiki/Dangling_pointer

    For example, if the pointer is used to make a virtual function call, a different address (possibly pointing at exploit code) may be called due to the vtable pointer being overwritten. Alternatively, if the pointer is used for writing to memory, some other data structure may be corrupted.

  7. Region-based memory management - Wikipedia

    en.wikipedia.org/wiki/Region-based_memory_management

    Region-based memory management. In computer science, region-based memory management is a type of memory management in which each allocated object is assigned to a region. A region, also called a zone, arena, area, or memory context, is a collection of allocated objects that can be efficiently reallocated or deallocated all at once.

  8. Resource leak - Wikipedia

    en.wikipedia.org/wiki/Resource_leak

    Resource leak. In computer science, a resource leak is a particular type of resource consumption by a computer program where the program does not release resources it has acquired. This condition is normally the result of a bug in a program. Typical resource leaks include memory leak and handle leak, particularly file handle leaks, though ...

  9. List of performance analysis tools - Wikipedia

    en.wikipedia.org/wiki/List_of_performance...

    CLR Profiler is a free memory profiler provided by Microsoft for CLR applications. GlowCode is a performance and memory profiler for .NET applications using C# and other .NET languages. It identifies time-intensive functions and detects memory leaks and errors in native, managed and mixed Windows x64 and x86 applications. Visual Studio