Sciweavers

28 search results - page 5 / 6
» Pointer Analysis for Source-to-Source Transformations
Sort
View
PLDI
2005
ACM
14 years 29 days ago
Automatic pool allocation: improving performance by controlling data structure layout in the heap
This paper describes Automatic Pool Allocation, a transformation framework that segregates distinct instances of heap-based data structures into seperate memory pools and allows h...
Chris Lattner, Vikram S. Adve
DAC
1997
ACM
13 years 11 months ago
System Level Fixed-Point Design Based on an Interpolative Approach
The design process for xed-point implementations either in software or in hardware requires a bit-true speci cation of the algorithm in order to analyze quantization e ects on an...
Markus Willems, Volker Bürsgens, Holger Kedin...
ESORICS
2004
Springer
14 years 23 days ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
EMSOFT
2007
Springer
14 years 1 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
DLS
2009
227views Languages» more  DLS 2009»
13 years 5 months ago
The ruby intermediate language
Ruby is a popular, dynamic scripting language that aims to "feel natural to programmers"and give users the"freedom to choose" among many different ways of doin...
Michael Furr, Jong-hoon (David) An, Jeffrey S. Fos...