Sciweavers

ASPLOS
2006
ACM
14 years 2 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
ASPLOS
2006
ACM
14 years 2 months ago
Hunting Trojan Horses
Micha Moffie, Winnie Cheng, David R. Kaeli, Qin Zh...
ASPLOS
2006
ACM
14 years 2 months ago
Portability events: a programming model for scalable system infrastructures
Clustered Objects (COs) [1] have been proven to be an effective ion for improving scalability of systems software [2, 3]. But can we devise a programming model that would allow CO...
Chris Matthews, Yvonne Coady, Jonathan Appavoo
ASPLOS
2006
ACM
14 years 2 months ago
Type inference for unboxed types and first class mutability
Systems programs rely on fine-grain control of data representation and use of state to achieve performance, conformance to hardware specification, and temporal predictability. T...
Swaroop Sridhar, Jonathan S. Shapiro
ASPLOS
2006
ACM
14 years 2 months ago
Accelerator: using data parallelism to program GPUs for general-purpose uses
GPUs are difficult to program for general-purpose uses. Programmers can either learn graphics APIs and convert their applications to use graphics pipeline operations or they can ...
David Tarditi, Sidd Puri, Jose Oglesby
ASPLOS
2006
ACM
14 years 2 months ago
Combinatorial sketching for finite programs
Sketching is a software synthesis approach where the programmer develops a partial implementation — a sketch — and a separate specification of the desired functionality. The ...
Armando Solar-Lezama, Liviu Tancau, Rastislav Bod&...
ASPLOS
2006
ACM
14 years 2 months ago
Ultra low-cost defect protection for microprocessor pipelines
The sustained push toward smaller and smaller technology sizes has reached a point where device reliability has moved to the forefront of concerns for next-generation designs. Sil...
Smitha Shyam, Kypros Constantinides, Sujay Phadke,...
ASPLOS
2006
ACM
14 years 2 months ago
A program transformation and architecture support for quantum uncomputation
  Quantum  computing’s  power  comes  from  new  algorithms  that exploit quantum mechanical phenomena for computation. Quantum algorithms  are  different  from...
Ethan Schuchman, T. N. Vijaykumar