Sciweavers

1452 search results - page 171 / 291
» Algorithmic Analysis of Array-Accessing Programs
Sort
View
93
Voted
ESSOS
2010
Springer
15 years 9 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
86
Voted
OOPSLA
2007
Springer
15 years 6 months ago
Inferring aliasing and encapsulation properties for java
There are many proposals for language techniques to control aliasing and encapsulation in object oriented programs, typically based on notions of object ownership and pointer uniq...
Kin-Keung Ma, Jeffrey S. Foster
133
Voted
ACMMSP
2004
ACM
131views Hardware» more  ACMMSP 2004»
15 years 6 months ago
Reuse-distance-based miss-rate prediction on a per instruction basis
Feedback-directed optimization has become an increasingly important tool in designing and building optimizing compilers. Recently, reuse-distance analysis has shown much promise i...
Changpeng Fang, Steve Carr, Soner Önder, Zhen...
ASE
2007
143views more  ASE 2007»
15 years 24 days ago
Composition inference for UML class diagrams
Knowing which associations are compositions is important in a tool for the reverse engineering of UML class diagrams. Firstly, recovery of composition relationships bridges the ga...
Ana Milanova
EMSOFT
2009
Springer
15 years 7 months ago
Compositional deadlock detection for rendezvous communication
Concurrent programming languages are growing in importance with the advent of multi-core systems. However, concurrent programs suffer from problems, such as data races and deadloc...
Baolin Shao, Nalini Vasudevan, Stephen A. Edwards