Sciweavers

3708 search results - page 356 / 371
» Programming with C Exceptions
Sort
View
145 views 127 votes 15 years 6 months ago  CF 2006»
This paper presents our experience mapping OpenMP parallel programming model to the IBM Cyclops-64 (C64) architecture. The C64 employs a many-core-on-a-chip design that integrates...
86 views 107 votes 15 years 3 months ago  SERVICES 2008»
Described here is a proposed curriculum design for service engineering based on the six years of experience of a master's program at the School of Software and Microelectroni...
95 views 80 votes 15 years 3 months ago  ANLP 2000»
ARBITER is a Prolog program that extracts assertions about macromolecular binding relationships from biomedical text. We describe the domain knowledge and the underspecified lingu...
93 views 107 votes 15 years 2 months ago  IPL 2006»
A language is defined by closure under safe iteration and under a new form of safe diagonalization that, unlike other forms of diagonalization used in literature to define sub-recu...
122 views 210 votes 16 years 2 months ago  POPL 2003»
We present an interprocedural and compositional algorithm for finding pairs of compatible allocation sites, which have the property that no object allocated at one site is live at...
257 views 142 votes 15 years 9 months ago  CGO 2010»
We present a practical and scalable method for flow- and contextsensitive (FSCS) pointer analysis for C programs. Our method analyzes the pointers in a program level by level in ...
120 views 143 votes 15 years 6 months ago  PLDI 2000»
Dynamic class loading during program execution in the JavaTM Programming Language is an impediment for generating code that is as e cient as code generated using static wholeprogr...
303 views 175 votes 13 years 10 months ago  AOSD 2012»
Emerging languages are often source-to-source compiled to mainstream ones, which offer standardized, fine-tuned implementations of non-functional concerns (NFCs)—including pers...
153 views 140 votes 16 years 3 months ago  SIGSOFT 2007»
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
132 views 210 votes 16 years 3 months ago  ASPLOS 2009»
This paper presents a surprising result: changing a seemingly innocuous aspect of an experimental setup can cause a systems researcher to draw wrong conclusions from an experiment...