Sciweavers

3708 search results - page 325 / 371
» Programming with C Exceptions
Sort
View
146 views 119 votes 15 years 6 months ago  SIGCSE 2005»
As Computer Science educators, we know that students learn more from projects that are fun and challenging, that seem “real” to them, and that allow them to be creative in des...
94 views 235 votes 16 years 1 months ago  POPL 2009»
Pointer analysis is a prerequisite for many program analyses, and the effectiveness of these analyses depends on the precision of the pointer information they receive. Two major a...
136 views 201 votes 16 years 1 months ago  POPL 2007»
We present a formal model of memory that both captures the lowlevel features of C's pointers and memory, and that forms the basis for an expressive implementation of separati...
113 views 197 votes 16 years 1 months ago  POPL 2007»
We introduce lock allocation, an automatic technique that takes a multi-threaded program annotated with atomic sections (that must be executed atomically), and infers a lock assig...
122 views 169 votes 16 years 1 months ago  POPL 2001»
We present a variant of Proof-Carrying Code (PCC) in which the trusted inference rules are represented as a higher-order logic program, the proof checker is replaced by a nondeter...
129 views 171 votes 16 years 1 months ago  POPL 2001»
By combining existing type systems with standard typebased compilation techniques, we describe how to write strongly typed programs that include a function that acts as a tracing ...
135 views 91 votes 15 years 7 months ago  CCS 2009»
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
187 views 121 votes 15 years 7 months ago  SECON 2007»
—Programming Wireless Sensor Network (WSN) applications is known to be a difficult task. Part of the problem is that the resource limitations of typical WSN nodes force programm...
118 views 96 votes 15 years 7 months ago  ASPLOS 2006»
Significant time is spent by companies trying to reproduce and fix bugs. BugNet and FDR are recent architecture proposals that provide architecture support for deterministic rep...
99 views 102 votes 15 years 6 months ago  ACMMSP 2005»
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...