Sciweavers

1821 search results - page 254 / 365
» Security-Aware Program Transformations
Sort
View
122
Voted
DSN
2006
IEEE
15 years 4 months ago
Efficiently Detecting All Dangling Pointer Uses in Production Servers
In this paper, we propose a novel technique to detect all dangling pointer uses at run-time that is efficient enough for production use in server codes. One idea (previously used ...
Dinakar Dhurjati, Vikram S. Adve
86
Voted
ICFP
2008
ACM
16 years 24 days ago
Implicitly-threaded parallelism in Manticore
The increasing availability of commodity multicore processors is making parallel computing available to the masses. Traditional parallel languages are largely intended for large-s...
Matthew Fluet, Mike Rainey, John H. Reppy, Adam Sh...
105
Voted
PLDI
2003
ACM
15 years 6 months ago
CCured in the real world
CCured is a program transformation system that adds memory safety guarantees to C programs by verifying statically that memory errors cannot occur and by inserting run-time checks...
Jeremy Condit, Matthew Harren, Scott McPeak, Georg...
140
Voted
FIDJI
2003
Springer
15 years 6 months ago
Hard Real-Time Implementation of Embedded Software in JAVA
The popular slogan ”write once, run anywhere” effectively renders the expressive capabilities of the Java programming framework for developing, deploying, and reusing target-i...
Jean-Pierre Talpin, Abdoulaye Gamatié, Davi...
156
Voted
JDCTA
2010
146views more  JDCTA 2010»
14 years 7 months ago
Modelling for Cruise Two-Dimensional Online Revenue Management System
To solve the cruise two-dimensional revenue management problem and develop such an automated system under uncertain environment, a static model which is a stochastic integer progr...
Bingzhou Li