Sciweavers

3708 search results - page 356 / 371
» Programming with C Exceptions
Sort
View
145 views 108 votes 15 years 4 months ago  CF 2006»
This paper presents our experience mapping OpenMP parallel programming model to the IBM Cyclops-64 (C64) architecture. The C64 employs a many-core-on-a-chip design that integrates...
86 views 93 votes 15 years 2 months ago  SERVICES 2008»
Described here is a proposed curriculum design for service engineering based on the six years of experience of a master's program at the School of Software and Microelectroni...
95 views 67 votes 15 years 2 months ago  ANLP 2000»
ARBITER is a Prolog program that extracts assertions about macromolecular binding relationships from biomedical text. We describe the domain knowledge and the underspecified lingu...
93 views 97 votes 15 years 22 days ago  IPL 2006»
A language is defined by closure under safe iteration and under a new form of safe diagonalization that, unlike other forms of diagonalization used in literature to define sub-recu...
122 views 187 votes 16 years 1 months ago  POPL 2003»
We present an interprocedural and compositional algorithm for finding pairs of compatible allocation sites, which have the property that no object allocated at one site is live at...
257 views 123 votes 15 years 7 months ago  CGO 2010»
We present a practical and scalable method for flow- and contextsensitive (FSCS) pointer analysis for C programs. Our method analyzes the pointers in a program level by level in ...
120 views 131 votes 15 years 5 months ago  PLDI 2000»
Dynamic class loading during program execution in the JavaTM Programming Language is an impediment for generating code that is as e cient as code generated using static wholeprogr...
303 views 156 votes 13 years 8 months ago  AOSD 2012»
Emerging languages are often source-to-source compiled to mainstream ones, which offer standardized, fine-tuned implementations of non-functional concerns (NFCs)—including pers...
153 views 123 votes 16 years 1 months ago  SIGSOFT 2007»
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
132 views 190 votes 16 years 1 months ago  ASPLOS 2009»
This paper presents a surprising result: changing a seemingly innocuous aspect of an experimental setup can cause a systems researcher to draw wrong conclusions from an experiment...