-
1
-
-
0004072686
-
-
2nd ed. Addison Wesley
-
A. V. Aho, M. S. Lam, R. Sethi, and J. D. Ullman, Compilers: Principles, Techniques, and Tools, 2nd ed. Addison Wesley, 2006.
-
(2006)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Lam, M.S.2
Sethi, R.3
Ullman, J.D.4
-
2
-
-
47249127725
-
The case for energy-proportional computing
-
L. A. Barroso and U. Ḧolzle, "The case for energy-proportional computing," Computer, vol. 40, pp. 33-37, 2007.
-
(2007)
Computer
, vol.40
, pp. 33-37
-
-
Barroso, L.A.1
Holzle, U.2
-
3
-
-
84886379705
-
Timing the application of security patches for optimal uptime
-
S. Beattie, S. Arnold, C. Cowan, P. Wagle, and C. Wright, "Timing the application of security patches for optimal uptime," in LISA'02.
-
LISA'02
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
-
4
-
-
33746101822
-
Diehard: Probabilistic memory safety for unsafe languages
-
E. D. Berger and B. G. Zorn, "Diehard: probabilistic memory safety for unsafe languages," in PLDI'06.
-
PLDI'06
-
-
Berger, E.D.1
Zorn, B.G.2
-
6
-
-
79951601798
-
Multiplicity computing: A vision of software engineering for next-generation computing platform applications
-
C. Cadar, P. Pietzuch, and A. L. Wolf, "Multiplicity computing: A vision of software engineering for next-generation computing platform applications," in FoSER'10.
-
FoSER'10
-
-
Cadar, C.1
Pietzuch, P.2
Wolf, A.L.3
-
7
-
-
0003330315
-
The model human processor: An engineering model for human performance
-
S. Card, T. Moran, and A. Newell, "The model human processor: an engineering model for human performance," Handbook of Perception and Human Performance, vol. 2, pp. 1-35, 1986.
-
(1986)
Handbook of Perception and Human Performance
, vol.2
, pp. 1-35
-
-
Card, S.1
Moran, T.2
Newell, A.3
-
8
-
-
36749050545
-
N-version programming: A fault-tolerance approach to reliability of software operation
-
L. Chen and A. Avizienis, "N-version programming: A fault-tolerance approach to reliability of software operation," in FTCS'78.
-
FTCS'78
-
-
Chen, L.1
Avizienis, A.2
-
9
-
-
85088602314
-
Highly reliable upgrading of components
-
J. E. Cook and J. A. Dage, "Highly reliable upgrading of components," in ICSE'99.
-
ICSE'99
-
-
Cook, J.E.1
Dage, J.A.2
-
10
-
-
84886412957
-
-
J. CorbetCross memory attach
-
J. Corbet, "Cross memory attach," http://lwn.net/Articles/ 405346/, 2010.
-
-
-
-
11
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser, "N-variant systems: a secretless framework for security through diversity," in USENIX Security'06.
-
USENIX Security'06
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
13
-
-
85088335091
-
Staged deployment in Mirage, an integrated software upgrade testing and distribution system
-
O. Crameri, N. Knezevic, D. Kostic, R. Bianchini, and W. Zwaenepoel, "Staged deployment in Mirage, an integrated software upgrade testing and distribution system," in SOSP'07.
-
SOSP'07
-
-
Crameri, O.1
Knezevic, N.2
Kostic, D.3
Bianchini, R.4
Zwaenepoel, W.5
-
14
-
-
34548201197
-
Delta execution for efficient state-space exploration of object-oriented programs
-
M. d'Amorim, S. Lauterburg, and D. Marinov, "Delta execution for efficient state-space exploration of object-oriented programs," in ISSTA'07.
-
ISSTA'07
-
-
Damorim, M.1
Lauterburg, S.2
Marinov, D.3
-
15
-
-
84866900182
-
The GISMOE challenge: Constructing the pareto program surface using genetic programming to find better programs
-
M. Harman, W. Langdon, Y. Jia, D. White, A. Arcuri, and J. Clark, "The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs," in ASE'12.
-
ASE'12
-
-
Harman, M.1
Langdon, W.2
Jia, Y.3
White, D.4
Arcuri, A.5
Clark, J.6
-
16
-
-
84869825517
-
Kitsune: Efficient, general-purpose dynamic software updating for C
-
C. M. Hayden, E. K. Smith, M. Denchev, M. Hicks, and J. S. Foster, "Kitsune: Efficient, general-purpose dynamic software updating for C," in OOPSLA'12.
-
OOPSLA'12
-
-
Hayden, C.M.1
Smith, E.K.2
Denchev, M.3
Hicks, M.4
Foster, J.S.5
-
17
-
-
84876358719
-
Shared execution for efficiently testing product lines
-
C. H. P. Kim, S. Khurshid, and D. Batory, "Shared execution for efficiently testing product lines," in ISSRE'12.
-
ISSRE'12
-
-
Kim, C.H.P.1
Khurshid, S.2
Batory, D.3
-
19
-
-
84886414539
-
Immediate multi-threaded dynamic software updates using stack reconstruction
-
K. Makris and R. A. Bazi, "Immediate multi-threaded dynamic software updates using stack reconstruction," in USENIX ATC'09.
-
USENIX ATC'09
-
-
Makris, K.1
Bazi, R.A.2
-
20
-
-
84910644560
-
TACHYON: Tandem execution for efficient live patch testing
-
M. Maurer and D. Brumley, "TACHYON: Tandem execution for efficient live patch testing," in USENIX Security'12.
-
USENIX Security'12
-
-
Maurer, M.1
Brumley, D.2
-
22
-
-
84885578759
-
Rx: Treating bugs as allergies-A safe method to survive software failures
-
F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou, "Rx: treating bugs as allergies-a safe method to survive software failures," in SOSP'05.
-
SOSP'05
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
23
-
-
84906487819
-
Enhancing server availability and security through failureoblivious computing
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and J. William S. Beebee, "Enhancing server availability and security through failureoblivious computing," in OSDI'04.
-
OSDI'04
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
William Beebee, S.J.6
-
24
-
-
70349127596
-
Orchestra: Intrusion detection using parallel execution and monitoring of program variants in user-space
-
B. Salamat, T. Jackson, A. Gal, and M. Franz, "Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space," in EuroSys'09.
-
EuroSys'09
-
-
Salamat, B.1
Jackson, T.2
Gal, A.3
Franz, M.4
-
26
-
-
33646001408
-
Execution transactions for defending against software failures: Use and evaluation
-
S. Sidiroglou and A. D. Keromytis, "Execution transactions for defending against software failures: Use and evaluation," IJIS, vol. 5, no. 2, pp. 77-91, 2006.
-
(2006)
IJIS
, vol.5
, Issue.2
, pp. 77-91
-
-
Sidiroglou, S.1
Keromytis, A.D.2
-
27
-
-
27544444335
-
Flashback: A lightweight extension for rollback and deterministic replay for software debugging
-
S. M. Srinivasan, S. Kandula, C. R. Andrews, and Y. Zhou, "Flashback: A lightweight extension for rollback and deterministic replay for software debugging," in USENIX ATC'04.
-
USENIX ATC'04
-
-
Srinivasan, S.M.1
Kandula, S.2
Andrews, C.R.3
Zhou, Y.4
-
28
-
-
85051053333
-
Efficient online validation with delta execution
-
J. Tucek, W. Xiong, and Y. Zhou, "Efficient online validation with delta execution," in ASPLOS'09.
-
ASPLOS'09
-
-
Tucek, J.1
Xiong, W.2
Zhou, Y.3
-
30
-
-
0025263529
-
Back-to-back testing
-
Jan.-Feb
-
M. A. Vouk, "Back-to-back testing," IST, vol. 32, pp. 34-45, Jan.-Feb. 1990.
-
(1990)
IST
, vol.32
, pp. 34-45
-
-
Vouk, M.A.1
-
31
-
-
84939133809
-
Using replicated execution for a more secure and reliable web browser
-
H. Xue, N. Dautenhahn, and S. T. King, "Using replicated execution for a more secure and reliable web browser," in NDSS'12.
-
NDSS'12
-
-
Xue, H.1
Dautenhahn, N.2
King, S.T.3
-
32
-
-
84886381557
-
How do fixes become bugs
-
Z. Yin, D. Yuan, Y. Zhou, S. Pasupathy, and L. Bairavasundaram, "How do fixes become bugs?" in ESEC/FSE'11.
-
ESEC/FSE'11
-
-
Yin, Z.1
Yuan, D.2
Zhou, Y.3
Pasupathy, S.4
Bairavasundaram, L.5
|