Sciweavers

1760 search results - page 174 / 352
» A System to Mark Programs Automatically
Sort
View
COMPUTER
2000
138views more  COMPUTER 2000»
15 years 3 months ago
Making Pointer-Based Data Structures Cache Conscious
Processor and memory technology trends portend a continual increase in the relative cost of accessing main memory. Machine designers have tried to mitigate the effect of this tren...
Trishul M. Chilimbi, Mark D. Hill, James R. Larus
ISSTA
2012
ACM
13 years 5 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
RTA
2010
Springer
15 years 6 months ago
Automated Termination Analysis of Java Bytecode by Term Rewriting
We present an automated approach to prove termination of Java Bytecode (JBC) programs by automatically transforming them to term rewrite systems (TRSs). In this way, the numerous t...
Carsten Otto, Marc Brockschmidt, Christian von Ess...
IIS
2001
15 years 4 months ago
Intelligent Techniques in Stock Analysis
The paper presents computer system, named Stock Market Electronic Expert (SMEE), for Stock Market Analysis. It is developed as friendly, useful and credible computer program giving...
Halina Kwasnicka, Marcin Ciosmak
ICFP
2007
ACM
15 years 7 months ago
iTasks: executable specifications of interactive work flow systems for the web
In this paper we introduce the iTask system: a set of combinators to specify work flows in a pure functional language at a very high level of abstraction. Work flow systems are au...
Rinus Plasmeijer, Peter Achten, Pieter W. M. Koopm...