LLVM: A compilation framework for lifelong program analysis & transformation C Lattner, V Adve International symposium on code generation and optimization, 2004. CGO 2004 …, 2004 | 7498 | 2004 |
A type and effect system for deterministic parallel Java RL Bocchino Jr, VS Adve, D Dig, SV Adve, S Heumann, R Komuravelli, ... Proceedings of the 24th ACM SIGPLAN conference on Object oriented …, 2009 | 462 | 2009 |
Understanding the propagation of hard errors to software and implications for resilient system design ML Li, P Ramachandran, SK Sahoo, SV Adve, VS Adve, Y Zhou ACM Sigplan Notices 43 (3), 265-276, 2008 | 364 | 2008 |
Making context-sensitive points-to analysis with heap cloning practical for the real world C Lattner, A Lenharth, V Adve ACM SIGPLAN Notices 42 (6), 278-289, 2007 | 352 | 2007 |
KCoFI: Complete control-flow integrity for commodity operating system kernels J Criswell, N Dautenhahn, V Adve 2014 IEEE symposium on security and privacy, 292-307, 2014 | 286 | 2014 |
Backwards-compatible array bounds checking for C with very low overhead D Dhurjati, V Adve Proceedings of the 28th international conference on Software engineering …, 2006 | 285 | 2006 |
Parallel programming must be deterministic by default RL Bocchino, V Adve, S Adve, M Snir Usenix HotPar 6 (10.5555), 1, 2009 | 268 | 2009 |
Automatic pool allocation: improving performance by controlling data structure layout in the heap C Lattner, V Adve ACM Sigplan Notices 40 (6), 129-142, 2005 | 267 | 2005 |
DeNovo: Rethinking the memory hierarchy for disciplined parallelism B Choi, R Komuravelli, H Sung, R Smolinski, N Honarmand, SV Adve, ... 2011 International Conference on Parallel Architectures and Compilation …, 2011 | 255 | 2011 |
Understanding integer overflow in C/C++ W Dietz, P Li, J Regehr, V Adve ACM Transactions on Software Engineering and Methodology (TOSEM) 25 (1), 1-29, 2015 | 254 | 2015 |
Performance analysis of mesh interconnection networks with deterministic routing VS Adve, MK Vernon IEEE Transactions on Parallel and Distributed Systems 5 (3), 225-246, 1994 | 243 | 1994 |
Software transactional memory for large scale clusters RL Bocchino, VS Adve, BL Chamberlain Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of …, 2008 | 227 | 2008 |
Secure virtual architecture: A safe execution environment for commodity operating systems J Criswell, A Lenharth, D Dhurjati, V Adve Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007 | 224 | 2007 |
SAFECode: Enforcing alias analysis for weakly typed languages D Dhurjati, S Kowshik, V Adve ACM SIGPLAN Notices 41 (6), 144-157, 2006 | 219 | 2006 |
Virtual ghost: Protecting applications from hostile operating systems J Criswell, N Dautenhahn, V Adve ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014 | 189 | 2014 |
Using likely program invariants to detect hardware errors SK Sahoo, ML Li, P Ramachandran, SV Adve, VS Adve, Y Zhou 2008 IEEE International Conference on Dependable Systems and Networks With …, 2008 | 188 | 2008 |
Nested kernel: An operating system architecture for intra-kernel privilege separation N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve Proceedings of the Twentieth International Conference on Architectural …, 2015 | 183 | 2015 |
An integrated compilation and performance analysis environment for data parallel programs VS Adve, J Mellor-Crummey, M Anderson, JC Wang, DA Reed, ... Proceedings of the 1995 ACM/IEEE Conference on Supercomputing, 50-es, 1995 | 182 | 1995 |
Memory safety without runtime checks or garbage collection D Dhurjati, S Kowshik, V Adve, C Lattner Proceedings of the 2003 ACM SIGPLAN conference on language, compiler, and …, 2003 | 164 | 2003 |
Efficiently detecting all dangling pointer uses in production servers D Dhurjati, V Adve International Conference on Dependable Systems and Networks (DSN'06), 269-280, 2006 | 137 | 2006 |