Sciweavers

365 search results - page 71 / 73
» Types for Safe Locking
Sort
View
PLDI
2004
ACM
13 years 11 months ago
Region inference for an object-oriented language
Region-based memory management offers several important potential advantages over garbage collection, including real-time performance, better data locality, and more efficient us...
Wei-Ngan Chin, Florin Craciun, Shengchao Qin, Mart...
COMPGEOM
2003
ACM
13 years 11 months ago
Controlled perturbation for arrangements of circles
Given a collection C of circles in the plane, we wish to construct the arrangement A(C) (namely the subdivision of the plane into vertices, edges and faces induced by C) using fl...
Dan Halperin, Eran Leiserowitz
ICCL
1998
IEEE
13 years 10 months ago
Transactions for Java
We present a design and implementation of transactions and general-purpose persistence for Java. These additions allow Java programmers to manipulate any Java object using transac...
Alex Garthwaite, Scott Nettles
ISSTA
2010
ACM
13 years 10 months ago
Proving memory safety of floating-point computations by combining static and dynamic program analysis
Whitebox fuzzing is a novel form of security testing based on dynamic symbolic execution and constraint solving. Over the last couple of years, whitebox fuzzers have found many ne...
Patrice Godefroid, Johannes Kinder
CCGRID
2001
IEEE
13 years 10 months ago
Charging Distributed Services of a Computational Grid Architecture
Charging of services in a distributed system will become more and more important for systems which are utilized commercially. Such an important distributed system exists in form o...
Burkhard Stiller, Jan Gerke, Placi Flury, Peter Re...