Zobrazeno 1 - 10
of 474
pro vyhledávání: '"Call stack"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Kelly Maggs, Vanessa Robins
Publikováno v:
Frontiers in Applied Mathematics and Statistics, Vol 7 (2021)
Fuzzing is a systematic large-scale search for software vulnerabilities achieved by feeding a sequence of randomly mutated input files to the program of interest with the goal being to induce a crash. The information about inputs, software execution
Externí odkaz:
https://doaj.org/article/800c2f9acdd94583b35caacf85a27fdd
Autor:
Denis Sheahan, Janet Yang, Lei Tian, Valentin Andrei, Bilge Acun, Cyril Meurillon, Gisle Dankel, Peifeng Yu, Adnan Aziz, Christopher Gregg, Lukasz Wesolowski, Kim Hazelwood, Xiaoqiao Meng
Publikováno v:
IEEE Micro. 41:101-112
In this article, we present a system to collectively optimize efficiency in a very large scale deployment of GPU servers for machine learning workloads at Facebook. Our system 1) measures and stores system-wide efficiency metrics for every executed w
Publikováno v:
Russian Microelectronics. 49:516-522
The characteristic features of the reduced instruction set computer (RISC) architecture are used to develop high-performance microprocessors and microcontrollers. Complex operations, which include subroutine calls and interrupt service, are difficult
Publikováno v:
Journal of Computer Science and Technology. 35:1295-1311
Conditional pushdown systems (CPDSs) extend pushdown systems by associating each transition rule with a regular language over the stack alphabet. The goal is to model program verification problems that need to examine the runtime call stack of progra
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39:3398-3407
Return-oriented programming (ROP) is a prevalent code reuse technique that hijacks a program’s control flow by modifying its return addresses on the stack. Researchers have proposed some return address verification methods by using the message auth
Using a stack for managing the local state of procedures as popularized by Algol is a simple but effective way to achieve a primitive form of automatic memory management. Hence, the call stack remains the backbone of most programming language runtime
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0d77ab1b38eea3a59ebc80ba3b6625f2
The main paper presents λ^{1/2}_{↩}, a type system and operational semantics with 2nd-class values and delayed stack reclamation. This artifact contains a compiler implementation of the calculus in Scala Native, the code for the case studies shown
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3f253f42342b2d2e64256a82484b418f
Publikováno v:
Proceedings of the Institute for System Programming of the RAS. 32:89-96
Despite the fact that software development uses various technologies and approaches to diagnose errors in the early stages of development and testing, some errors are discovered during operation. To the user, errors often look like a program crash wh