Results 31 to 40 of about 10,356 (199)

Loop Quasi-Invariant Chunk Motion by peeling with statement composition [PDF]

open access: yes, 2017
Several techniques for analysis and transformations are used in compilers. Among them, the peeling of loops for hoisting quasi-invariants can be used to optimize generated code, or simply ease developers' lives.
Moyen, Jean-Yves   +2 more
core   +2 more sources

Building an obfuscation compiler based on LLVM infrastructure

open access: yesТруды Института системного программирования РАН, 2018
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS.  The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin   +3 more
doaj   +1 more source

Intelligent intrusion detection in low power IoTs [PDF]

open access: yes, 2016
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali   +3 more
core   +1 more source

Engineering a static verification tool for GPU kernels [PDF]

open access: yes, 2014
We report on practical experiences over the last 2.5 years related to the engineering of GPUVerify, a static verification tool for OpenCL and CUDA GPU kernels, plotting the progress of GPUVerify from a prototype to a fully functional and relatively ...
A.F. Donaldson   +13 more
core   +1 more source

Dynamic compilation of SQL queries for PostgreSQL

open access: yesТруды Института системного программирования РАН, 2018
In recent years, as performance and capacity of main and external memory grow, performance of database management systems (DBMSes) on certain kinds of queries is more determined by raw CPU speed.
R. A. Buchatskiy   +5 more
doaj   +1 more source

SMT-based Distributed Bounded Model Checking in Spark [PDF]

open access: yesJisuanji gongcheng, 2017
The credibility of program verification results and the verification efficiency in Satisfiablity Modulo Theories(SMT)-based bounded model checking are influenced greatly by bounds.However,the traditional serial checking method cannot validate under the ...
REN Shengbing,ZHANG Jianwei,WU Bin,WANG Zhijian
doaj   +1 more source

Towards Vulnerability Discovery Using Staged Program Analysis

open access: yes, 2016
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write.
J Dean   +6 more
core   +1 more source

Code trolley: hardware-assisted control flow obfuscation [PDF]

open access: yes, 2020
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core  

Multithread Approximation: An OpenMP Constructor

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 4, February 2026.
ABSTRACT This study introduces an OpenMP construct designed to simplify and unify the integration of approximate computing techniques into shared‐memory parallel programs. Approximate Computing leverages the inherent error tolerance of many applications to trade computational accuracy for gains in performance and energy efficiency.
João Briganti de Oliveira   +2 more
wiley   +1 more source

ThreadMonitor: Low‐Overhead Data Race Detection Using Intel Processor Trace

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 2, January 2026.
ABSTRACT Data races are among the most difficult multithreading bugs to find, due to their non‐deterministic nature. This and the increasing popularity of multithreaded programming have led to the need for practical automated data race detection. In this context, dynamic data race detectors have received more attention, compared to static tools, owing ...
Farzam Dorostkar   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy