ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Root scanning is the task of identifying references to heap objects that are stored outside of the heap itself, in global and local variables and on the execution stack. Root scann...
The IA-64, Intel's 64-bit instruction set architecture, exhibits a number of interesting architectural features. Here we consider those features as they relate to supporting ...
Richard L. Hudson, J. Eliot B. Moss, Sreenivas Sub...
Sparse wireless sensor networks (WSNs) are being effectively used in several applications, which include transportation, urban safety, environment monitoring, and many others. Sens...
Mario Di Francesco, Kunal Shah, Mohan Kumar, Giuse...
In robotics, exogenous fault detection is the process through which one robot detects faults that occur in other, physically separate robots. In this paper, we study exogenous faul...
Anders Lyhne Christensen, Rehan O'Grady, Mauro Bir...