Sciweavers

4722 search results - page 189 / 945
» Encoding Program Executions
Sort
View
128
Voted
ASPLOS
2006
ACM
15 years 11 months ago
Recording shared memory dependencies using strata
Significant time is spent by companies trying to reproduce and fix bugs. BugNet and FDR are recent architecture proposals that provide architecture support for deterministic rep...
Satish Narayanasamy, Cristiano Pereira, Brad Calde...
TRUST
2010
Springer
15 years 10 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
PLDI
1999
ACM
15 years 9 months ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh
IPPS
1998
IEEE
15 years 9 months ago
Predicated Software Pipelining Technique for Loops with Conditions
An effort to formalize the process of software pipelining loops with conditions is presented in this paper. A formal framework for scheduling such loops, based on representing set...
Dragan Milicev, Zoran Jovanovic
134
Voted
JAVA
1999
Springer
15 years 9 months ago
Dynamic Denotational Semantics of Java
This chapter presents a dynamic denotational semantics of the Java programming language. This semantics covers almost the full range of the base language, excluding only concurrenc...
Jim Alves-Foss, Fong Shing Lam