Sciweavers

3708 search results - page 357 / 371
» Programming with C Exceptions
Sort
View
257 views 123 votes 15 years 7 months ago  CGO 2010»
We present a practical and scalable method for flow- and contextsensitive (FSCS) pointer analysis for C programs. Our method analyzes the pointers in a program level by level in ...
120 views 131 votes 15 years 5 months ago  PLDI 2000»
Dynamic class loading during program execution in the JavaTM Programming Language is an impediment for generating code that is as e cient as code generated using static wholeprogr...
303 views 156 votes 13 years 8 months ago  AOSD 2012»
Emerging languages are often source-to-source compiled to mainstream ones, which offer standardized, fine-tuned implementations of non-functional concerns (NFCs)—including pers...
153 views 123 votes 16 years 1 months ago  SIGSOFT 2007»
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
132 views 190 votes 16 years 1 months ago  ASPLOS 2009»
This paper presents a surprising result: changing a seemingly innocuous aspect of an experimental setup can cause a systems researcher to draw wrong conclusions from an experiment...
125 views 87 votes 15 years 7 months ago  NDSS 2007»
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
135 views 101 votes 16 years 1 months ago  DAC 2006»
Deploying multiple supply voltages (multi-Vdds) on one chip is an important technique to reduce dynamic power consumption. In this work we present an optimality study for resource...
114 views 94 votes 16 years 1 months ago  WWW 2001»
"The Amber Room on the Web" project provides wide public access to information about the process of reconstruction of the Amber Room of the Catherine Palace outside of S...
111 views 204 votes 16 years 1 months ago  CP 2009»
The ALLDIFFERENT constraint was one of the first global constraints [17] and it enforces the conjunction of one binary constraint, the not-equal constraint, for every pair of varia...
137 views 111 votes 16 years 1 months ago  OSDI 2006»
Storage systems such as file systems, databases, and RAID systems have a simple, basic contract: you give them data, they do not lose or corrupt it. Often they store the only copy...