Sciweavers

1629 search results - page 299 / 326
» Infeasible Code Detection
Sort
View
ASPLOS
2010
ACM
14 years 3 months ago
Dynamic filtering: multi-purpose architecture support for language runtime systems
This paper introduces a new abstraction to accelerate the readbarriers and write-barriers used by language runtime systems. We exploit the fact that, dynamically, many barrier exe...
Tim Harris, Sasa Tomic, Adrián Cristal, Osm...
MICRO
2009
IEEE
326views Hardware» more  MICRO 2009»
14 years 3 months ago
DDT: design and evaluation of a dynamic program analysis for optimizing data structure usage
Data structures define how values being computed are stored and accessed within programs. By recognizing what data structures are being used in an application, tools can make app...
Changhee Jung, Nathan Clark
VTC
2008
IEEE
139views Communications» more  VTC 2008»
14 years 3 months ago
Downlink Steered Space-Time Spreading For Multi-Carrier Transmission Over Frequency Selective Channels
— This paper presents a novel amalgam of Steered Space-Time Spreading (SSTS) and Orthogonal Frequency Division Multiple Access (OFDMA) designed for attaining both spatial diversi...
Nazar Sahal, Mohammed El-Hajjar, Lajos Hanzo
ICSM
2007
IEEE
14 years 3 months ago
Matching Control Flow of Program Versions
In many application areas, including piracy detection, software debugging and maintenance, situations arise in which there is a need for comparing two versions of a program that d...
Vijayanand Nagarajan, Rajiv Gupta, Matias Madou, X...
NDSS
2007
IEEE
14 years 3 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...