DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Shadow heap
Shadow heap
Advanced Data Structures
Fast As a Shadow, Expressive As a Tree: Hybrid Memory Monitoring for C
Rockjit: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity
Speculative Separation for Privatization and Reductions
Download/Repository/Ivan Fratric.Pdf, 2012
Practical Analysis of Framework-Intensive Applications
Detecting Cacheable Data to Remove Bloat
IAR C/C++ Compiler User Guide
Energy Modelling of Multi-Threaded, Multi-Core Software for Embedded Systems
Shadow State Encoding for Efficient Monitoring of Block-Level Properties
Fast As a Shadow, Expressive As a Tree: Hybrid Memory Monitoring for C∗
Control-Flow Integrity: Precision, Security, and Performance
Energy Modelling of Multi-Threaded, Multi-Core Software for Embedded Systems
Algorithms for Dynamic Memory Management (236780) Lecture 6
Concurrent Garbage Collection Using Program Slices on Multithreaded Processors
Searching Encrypted Data with Size-Locked Indexes
Scissorgc: Scalable and Efficient Compaction for Java Full Garbage Collection
Preliminary Complexity Metrics
Top View
Analyzing Large-Scale Object-Oriented Software to Find and Remove Runtime Bloat
Abstracting Runtime Heaps for Program Understanding
Finding Low-Utility Data Structures
A Shadow Execution and Dynamic Analysis Framework for LLVM IR and Javascript
Suggested Final Project Topics
Cot: Decentralized Elastic Caches for Cloud Environments
Data Structures
Persistent Memory Analysis Tool (PMAT)
Fundamental Data Structures Zuyd Hogeschool, ICT Contents
Data Structure Identification from Executions of Pointer Programs
Type-Intertwined Separation Logic
1 Scalable Runtime Bloat Detection Using Abstract Dynamic Slicing
LIU Udel 0060D 13322.Pdf
Interprocedural Functional Shape Analysis Using Local Heaps Technical Report TAU-CS-26/04
Data Structures
Taking Back Control: Closing the Gap Between C/C++ and Machine
UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
Mitigating Memory-Safety Bugs with Efficient Out-Of-Process Integrity Checking