Sciweavers

309 search results - page 40 / 62
» Code Transformations for One-Pass Analysis
Sort
View
LCTRTS
2010
Springer
15 years 7 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
146
Voted
CGO
2006
IEEE
15 years 8 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
SAS
1997
Springer
111views Formal Methods» more  SAS 1997»
15 years 6 months ago
Fast and Effective Procedure Inlining
is an important optimization for programs that use procedural abstraction. Because inlining trades code size for execution speed, the effectiveness of an inlining algorithm is det...
Oscar Waddell, R. Kent Dybvig
132
Voted
IJWET
2008
75views more  IJWET 2008»
15 years 1 months ago
Semantic model-driven development of web service architectures
: Building service-based architectures has become a major area of interest since the advent of web services. Modelling these architectures is a central activity. Model-driven devel...
Claus Pahl
131
Voted
PLDI
2006
ACM
15 years 8 months ago
SAFECode: enforcing alias analysis for weakly typed languages
Static analysis of programs in weakly typed languages such as C and C++ is generally not sound because of possible memory errors due to dangling pointer references, uninitialized ...
Dinakar Dhurjati, Sumant Kowshik, Vikram S. Adve