121
click to vote
PLDI
15 years 7 months ago
2009 ACM
Multicore designs have emerged as the mainstream design paradigm for the microprocessor industry. Unfortunately, providing multiple cores does not directly translate into performa...
233
click to vote
PLDI
16 years 1 months ago
2009 ACM
Inefficient use of memory, including leaks and bloat, remain a significant challenge for C and C++ developers. Applications with these problems become slower over time as their wo...
101
Voted
PLDI
15 years 7 months ago
2009 ACM
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
PLDI
15 years 7 months ago
2009 ACM
The client computing platform is moving towards a heterogeneous architecture consisting of a combination of cores focused on scalar performance, and a set of throughput-oriented c...
98
Voted
PLDI
15 years 7 months ago
2009 ACM
In this paper, we initiate a formal study of security on Android: Google’s new open-source platform for mobile devices. Specifically, we present a core typed language to descri...
|