-
1
-
-
77957574634
-
-
Python/C API reference manual. Python Software Foundation, Nov.
-
Python/C API reference manual. Python Software Foundation, http: //docs.python.org/c-api, Nov. 2009.
-
(2009)
-
-
-
2
-
-
31744445215
-
Adding trace matching with free variables to aspect J
-
C. Allan, P. Avgustinov, A. S. Christensen, L. Hendren, S. Kuzins, O. Lhoták, O. de Moor, D. Sereni, G. Sittampalam, and J. Tibble. Adding trace matching with free variables to AspectJ. In ACM Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), pages 345-364, 2005.
-
(2005)
ACM Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA)
, pp. 345-364
-
-
Allan, C.1
Avgustinov, P.2
Christensen, A.S.3
Hendren, L.4
Kuzins, S.5
Lhoták, O.6
De Moor, O.7
Sereni, D.8
Sittampalam, G.9
Tibble, J.10
-
3
-
-
63549113935
-
QVM: An efficient runtime for detecting defects in deployed systems
-
M. Arnold, M. Vechev, and E. Yahav. QVM: An efficient runtime for detecting defects in deployed systems. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 143-162, 2008.
-
(2008)
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
, pp. 143-162
-
-
Arnold, M.1
Vechev, M.2
Yahav, E.3
-
5
-
-
34547418487
-
SWIG: An easy to use tool for integrating scripting languages with C and C++
-
D. M. Beazley. SWIG: An easy to use tool for integrating scripting languages with C and C++. In USENIX Tcl/Tk Workshop (TCLTK), pages 129-139, 1996.
-
(1996)
USENIX Tcl/Tk Workshop (TCLTK)
, pp. 129-139
-
-
Beazley, D.M.1
-
6
-
-
34248160938
-
The DaCapo benchmarks: Java benchmarking development and analysis
-
S. M. Blackburn, R. Garner, C. Hoffmann, A. M. Khang, K. S. McKinley, R. Bentzur, A. Diwan, D. Feinberg, D. Frampton, S. Z. Guyer, M. Hirzel, A. Hosking, M. Jump, H. Lee, J. E. B. Moss, B. Moss, A. Phansalkar, D. Stefanović, T. VanDrunen, D. von Dincklage, and B. Wiedermann. The DaCapo benchmarks: Java benchmarking development and analysis. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 169-190, 2006.
-
(2006)
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
, pp. 169-190
-
-
Blackburn, S.M.1
Garner, R.2
Hoffmann, C.3
Khang, A.M.4
McKinley, K.S.5
Bentzur, R.6
Diwan, A.7
Feinberg, D.8
Frampton, D.9
Guyer, S.Z.10
Hirzel, M.11
Hosking, A.12
Jump, M.13
Lee, H.14
Moss, J.E.B.15
Moss, B.16
Phansalkar, A.17
Stefanović, D.18
VanDrunen, T.19
Von Dincklage, D.20
Wiedermann, B.21
more..
-
7
-
-
42149109631
-
MOP: An efficient and generic runtime verification framework
-
F. Chen and G. Rosu. MOP: An efficient and generic runtime verification framework. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 569-588, 2007.
-
(2007)
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
, pp. 569-588
-
-
Chen, F.1
Rosu, G.2
-
9
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
Oct.
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 1-16, Oct. 2000.
-
(2000)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 1-16
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
13
-
-
42149088252
-
Jeannie: Granting java native interface developers their wishes
-
M. Hirzel and R. Grimm. Jeannie: Granting Java native interface developers their wishes. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 19-38, 2007.
-
(2007)
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
, pp. 19-38
-
-
Hirzel, M.1
Grimm, R.2
-
14
-
-
0035174624
-
The Exu approach to safe, transparent and lightweight interoperability
-
A. Kaplan, J. Bubba, and J. C. Wileden. The Exu approach to safe, transparent and lightweight interoperability. In IEEE International Computer Software and Applications Conference (COMPSAC), page 393, 2001.
-
(2001)
IEEE International Computer Software and Applications Conference (COMPSAC)
, pp. 393
-
-
Kaplan, A.1
Bubba, J.2
Wileden, J.C.3
-
17
-
-
72249085978
-
Debug all your code: Portable mixed-environment debugging
-
B. Lee, M. Hirzel, R. Grimm, and K. S. McKinley. Debug all your code: Portable mixed-environment debugging. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 207-226, 2009.
-
(2009)
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
, pp. 207-226
-
-
Lee, B.1
Hirzel, M.2
Grimm, R.3
McKinley, K.S.4
-
20
-
-
77957555617
-
-
NaturalBridge. BulletTrain JNI Checking Examples, Jan./http:///www. naturalbridge.com/jnichecking.html
-
NaturalBridge. BulletTrain JNI Checking Examples. http://web.archive.org/ web/*/http:///www.naturalbridge.com/jnichecking.html, Jan. 2001.
-
(2001)
-
-
-
22
-
-
70450250105
-
Automatic generation of library bindings using static analysis
-
T. Ravitch, S. Jackson, E. Aderhold, and B. Liblit. Automatic generation of library bindings using static analysis. In ACM Conference on Programming Language Design and Implementation (PLDI), pages 352-362, 2009.
-
(2009)
ACM Conference on Programming Language Design and Implementation (PLDI)
, pp. 352-362
-
-
Ravitch, T.1
Jackson, S.2
Aderhold, E.3
Liblit, B.4
-
23
-
-
0005346119
-
-
Standard Performance Evaluation Corporation, release 1.03 edition, March
-
Standard Performance Evaluation Corporation. SPECjvm98 Documentation, release 1.03 edition, March 1999.
-
(1999)
SPECjvm98 Documentation
-
-
-
25
-
-
42149145087
-
Safe Java native interface
-
G. Tan, A. W. Appel, S. Chakradhar, A. Raghunathan, S. Ravi, and D. Wang. Safe Java native interface. In IEEE International Symposium on Secure Software Engineering (ISSSE), pages 97-106, 2006.
-
(2006)
IEEE International Symposium on Secure Software Engineering (ISSSE)
, pp. 97-106
-
-
Tan, G.1
Appel, A.W.2
Chakradhar, S.3
Raghunathan, A.4
Ravi, S.5
Wang, D.6
-
26
-
-
70350696147
-
An empirical security study of the native code in the JDK
-
G. Tan and J. Croft. An empirical security study of the native code in the JDK. In Usenix Security Symposium (SS), pages 365-377, 2008.
-
(2008)
Usenix Security Symposium (SS)
, pp. 365-377
-
-
Tan, G.1
Croft, J.2
-
28
-
-
78650423472
-
Deep typechecking and refactoring
-
Z. Tatlock, C. Tucker, D. Shuffelton, R. Jhala, and S. Lerner. Deep typechecking and refactoring. In ACM Conference on Object- Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 37-52, 2008.
-
(2008)
ACM Conference on Object- Oriented Programming, Systems, Languages, and Applications (OOPSLA)
, pp. 37-52
-
-
Tatlock, Z.1
Tucker, C.2
Shuffelton, D.3
Jhala, R.4
Lerner, S.5
-
29
-
-
77957608428
-
-
The GNOME Project GNOME bug tracking system. Bug 576111 was opened 2009-2103-20
-
The GNOME Project. GNOME bug tracking system. Bug 576111 was opened 2009-2103-20. http://bugzilla.gnome.org.
-
-
-
|