-
2
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
T. M. Austin, S. E. Breach, and G. S. Sohi. Efficient detection of all pointer and array access errors. In Proc. 1994 Conf. on Prog. Lang. Design and Implementation, Orlando, FL, June 1994.
-
Proc. 1994 Conf. on Prog. Lang. Design and Implementation, Orlando, FL, June 1994
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
4
-
-
0033729897
-
The real-time specification for Java
-
G. Bollella and J. Gosling. The real-time specification for Java. Computer, 33(6):47-54, 2000.
-
(2000)
Computer
, vol.33
, Issue.6
, pp. 47-54
-
-
Bollella, G.1
Gosling, J.2
-
5
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
October
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems, pages 13(4):451-490, October 1991.
-
(1991)
ACM Transactions on Programming Languages and Systems
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
8
-
-
0003518498
-
-
Sun Microsystems, 2nd edition
-
J. Gosling, B. Joy, G. Steele, and G. Bracha. The Java Language Specification. Sun Microsystems, 2nd edition, 2000.
-
(2000)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
Bracha, G.4
-
9
-
-
0036040515
-
Region-based memory management in cyclone
-
D. Grossman, G. Morrisett, T. Jim, M. Hicks, Y. Wang, , and J. Cheney. Region-based memory management in cyclone. In Proc. SIGPLAN '02 Conf. on Programming Language Design and Implementation, Berlin, Germany, June 2002.
-
Proc. SIGPLAN '02 Conf. on Programming Language Design and Implementation, Berlin, Germany, June 2002
-
-
Grossman, D.1
Morrisett, G.2
Jim, T.3
Hicks, M.4
Wang, Y.5
Cheney, J.6
-
10
-
-
0036036137
-
The embedded machine: Predictable, portable real-time code
-
T. A. Henzinger and C. M. Kirsch. The embedded machine: Predictable, portable real-time code. In Proc. 2002 Conf. Prog. Lang. Design and Implementation, Berlin, Germany, June 2002.
-
Proc. 2002 Conf. Prog. Lang. Design and Implementation, Berlin, Germany, June 2002
-
-
Henzinger, T.A.1
Kirsch, C.M.2
-
11
-
-
0004181993
-
-
International Organisation for Standardisation. 1995. International Standard ISO/IEC 8652
-
International Organisation for Standardisation. Ada95 Reference Manual, 1995. International Standard ISO/IEC 8652:1995.
-
(1995)
Ada95 Reference Manual
-
-
-
12
-
-
85084164164
-
Cyclone: A safe dialect of C
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, , and Y. Wang. Cyclone: A safe dialect of C. In Proc. USENIX Annual Technical Conference, Monterey, CA, June 2002.
-
Proc. USENIX Annual Technical Conference, Monterey, CA, June 2002
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
13
-
-
0003904906
-
-
Technical report, Computer Science Dept., U. Maryland, College Park, Apr
-
W. Kelly, V. Maslov, W. Pugh, E. Rosser, T. Shpeisman, and D. Wonnacott. The Omega Library Interface Guide. Technical report, Computer Science Dept., U. Maryland, College Park, Apr. 1996.
-
(1996)
The Omega Library Interface Guide
-
-
Kelly, W.1
Maslov, V.2
Pugh, W.3
Rosser, E.4
Shpeisman, T.5
Wonnacott, D.6
-
15
-
-
0345203340
-
-
Tech. Report UIUCDCS-R-2002-2292, Computer Science Dept., Univ. of Illinois at Urbana-Champaign, Aug
-
C. Lattner and V. Adve. The LLVM Instruction Set and Compilation Strategy. Tech. Report UIUCDCS-R-2002-2292, Computer Science Dept., Univ. of Illinois at Urbana-Champaign, Aug 2002.
-
(2002)
The LLVM Instruction Set and Compilation Strategy
-
-
Lattner, C.1
Adve, V.2
-
20
-
-
84976676720
-
A practical algorithm for exact array dependence analysis
-
Aug
-
W. Pugh. A practical algorithm for exact array dependence analysis. Commun. ACM, 35(8):102-114, Aug. 1992.
-
(1992)
Commun. ACM
, vol.35
, Issue.8
, pp. 102-114
-
-
Pugh, W.1
-
22
-
-
0035394327
-
Using simplicity to control complexity
-
July/August
-
L. Sha. Using simplicity to control complexity. IEEE Software, July/August 2001.
-
(2001)
IEEE Software
-
-
Sha, L.1
-
23
-
-
0002997049
-
Region-based memory management
-
Feb
-
M. Tofte and J.-P. Talpin. Region-based memory management. Information and Computation, pages 132(2):109-176, Feb. 1997.
-
(1997)
Information and Computation
, vol.132
, Issue.2
, pp. 109-176
-
-
Tofte, M.1
Talpin, J.-P.2
-
24
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
San Diego, CA, February
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, pages 3-17, San Diego, CA, February 2000.
-
(2000)
Network and Distributed System Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
|