We present a new pointer analysis for use in shared memory programs running on hierarchical parallel machines. The analysis is motivated by the partitioned global address space lan...
As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure...
As more people take part in online conversations, awareness of the varying conversational styles and social mores afforded by different software is growing. However, this awarenes...
Embedded computing architectures can be designed to meet a variety of application specific requirements. However, optimized hardware can require compiler support to realize the po...
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...