Jred: Program customization and bloatware mitigation based on static analysis
Modern software engineering practice increasingly brings redundant code into software
products, which has caused a phenomenon called bloatware, leading to software system …
products, which has caused a phenomenon called bloatware, leading to software system …
Towards fully automatic placement of security sanitizers and declassifiers
B Livshits, S Chong - Acm Sigplan Notices, 2013 - dl.acm.org
A great deal of research on sanitizer placement, sanitizer correctness, checking path validity,
and policy inference, has been done in the last five to ten years, involving type systems …
and policy inference, has been done in the last five to ten years, involving type systems …
Age-based garbage collection
Modern generational garbage collectors look for garbage among the young objects,
because they have high mortality; however, these objects include the very youngest objects …
because they have high mortality; however, these objects include the very youngest objects …
A large study on the effect of code obfuscation on the quality of java code
Context: Obfuscation is a common technique used to protect software against malicious
reverse engineering. Obfuscators manipulate the source code to make it harder to analyze …
reverse engineering. Obfuscators manipulate the source code to make it harder to analyze …
PSO-HC: Particle swarm optimization protocol for hierarchical clustering in Wireless Sensor Networks
RS Elhabyan, MCE Yagoub - 10th IEEE international …, 2014 - ieeexplore.ieee.org
Clustering is an efficient topology control approach for maximizing the lifetime and scalability
of Wireless Sensor Networks (WSNs). Many cluster-based routing techniques have been …
of Wireless Sensor Networks (WSNs). Many cluster-based routing techniques have been …
Redcard: Redundant check elimination for dynamic race detectors
C Flanagan, SN Freund - … Conference, Montpellier, France, July 1-5, 2013 …, 2013 - Springer
Precise dynamic race detectors report an error if and only if an observed program trace
exhibits a data race. They must typically check for races on all memory accesses to ensure …
exhibits a data race. They must typically check for races on all memory accesses to ensure …
Type-based analysis and applications
J Palsberg - Proceedings of the 2001 ACM SIGPLAN-SIGSOFT …, 2001 - dl.acm.org
Type-based analysis is an approach to static analysis of programs that has been studied for
more than a decade. A type-based analysis assumes that the program type checks, and the …
more than a decade. A type-based analysis assumes that the program type checks, and the …
[PDF][PDF] A review of the rationale and architectures of PJama-a durable, flexible, evolvable and scalable orthogonally persistent programming platform.
MP Atkinson, MJ Jordan - SMLI TR, 2000 - Citeseer
This introduction describes the demand for better application programming technology
before we present the hypothesis that orthogonal persistence might be such a technology …
before we present the hypothesis that orthogonal persistence might be such a technology …
[PDF][PDF] Interprocedural side-effect analysis and optimisation in the presence of dynamic class loading
PH Nguyen, J Xue - ACSC, 2005 - Citeseer
We introduce a new approach to computing interprocedural modification side effects for
Java programs in the presence of dynamic class loading. When compile-time unknown …
Java programs in the presence of dynamic class loading. When compile-time unknown …
A lifetime optimal algorithm for speculative PRE
A lifetime optimal algorithm, called MC-PRE, is presented for the first time that performs
speculative PRE based on edge profiles. In addition to being computationally optimal in the …
speculative PRE based on edge profiles. In addition to being computationally optimal in the …