3,856 Hits in 5.8 sec

A Practical Escape and Effect Analysis for Building Lightweight Method Summaries [chapter]

Sigmund Cherem, Radu Rugina
Lecture Notes in Computer Science  
We present a unification-based, context-sensitive escape and effect analysis that infers lightweight method summaries describing heap effects.  ...  Restricting these parameters to small values allows us to keep the method summaries lightweight and practical.  ...  This paper proposes a practical inference algorithm that extracts lightweight method summaries (or signatures) to describe heap effects in Java programs.  ... 
doi:10.1007/978-3-540-71229-9_12 dblp:conf/cc/CheremR07 fatcat:y7fune76v5bqbp73gmc4ib6h4a

Stack allocation of objects in the CACAO virtual machine

Peter Molnar, Andreas Krall, Florian Brandner
2009 Proceedings of the 7th International Conference on Principles and Practice of Programming in Java - PPPJ '09  
The analysis proceeds in two stages: an intraprocedural analysis computes escape information for each allocation site within a single method and builds call-context agnostic summary information for the  ...  We have implemented a lightweight and fast escape analysis within the CACAO Java Virtual Machine to enable stack allocation.  ...  lightweight escape analysis for CA-CAO following the approach by Kotzmann [9, 11] . • A detailed evaluation of the results of the escape analysis and the related stack allocation of objects using the  ... 
doi:10.1145/1596655.1596680 dblp:conf/pppj/MolnarKB09 fatcat:gxnypimkpvg47mdbsr6zuursli

A Review on Fire Impacts on Concrete Structures

Shoib Bashir Wani
2020 Zenodo  
In this paper, the causes, effects and some remedies of deterioration in concrete due to fire hazard will be presented.  ...  However, concrete structures must be designed for fire outbreaks.  ...  TEST METHODS TO EVALUATE EFFECT OF FIRE ON DAMAGED CONCRETE The most common test method for determining fire resistance in the United States is the ASTM Standard E 119 Test Methods for Fire Tests of Building  ... 
doi:10.5281/zenodo.3980727 fatcat:gww6d5tj2bhbbnzf2oud5huyqi

A two-phase escape analysis for parallel java programs

Kyungwoo Lee, Samuel P. Midkiff
2006 Proceedings of the 15th international conference on Parallel architectures and compilation techniques - PACT '06  
Thread escape analysis is useful for a variety of purposes -finding races in multi-threaded programs, removing useless synchronization, allocating data to thread-local heaps, and compiling to target more  ...  This paper describes a two-phase offline/online interprocedural and inter-thread escape analysis that is faster and more accurate, on average, than previously published analyses.  ...  computed offline to make the online phase faster. • It describes a lightweight data structure, the level summary, that compactly represents thread escape information for objects and enables a fast interprocedural  ... 
doi:10.1145/1152154.1152166 dblp:conf/IEEEpact/LeeM06 fatcat:wnvflspvsjdxdktvtdwnywxlh4

Finding shrink critical section refactoring opportunities for the evolution of concurrent code in trustworthy software

Ju Qian, Lin Chen, BaoWen Xu
2013 Science China Information Sciences  
With such an analysis, more refactoring opportunities can be found. We build a tool and test our refactoring approach on several benchmark programs.  ...  In the approach, to achieve more optimizations, we develop a new escape analysis, named escape state analysis, which can not only tell us whether an object finally escapes but also determine the escape  ...  We thank the anonymous reviewers and Xiaoyu Zhou for their helpful comments and suggestions.  ... 
doi:10.1007/s11432-012-4743-z fatcat:qpqf6suydfdg5ikpvves2h736u

A Novel Lightweight Hybrid Intrusion Detection Method Using a Combination of Data Mining Techniques

Jatuphum Juanchaiyaphum, Ngamnij Arch-int, Somjit Arch-int, Saiyan Saiyod
2015 International Journal of Security and Its Applications  
In order to overcome the limitation of the conventional hybrid method, we propose a new lightweight hybrid intrusion detection method that consists of a combination of feature selection, clustering and  ...  In this paper, we propose a new lightweight hybrid intrusion detection method that combines data mining techniques, such as feature selection, clustering and classification.  ...  The study concludes in the final section, with a summary and recommendation for future research.  ... 
doi:10.14257/ijsia.2015.9.4.10 fatcat:t54ogudymjdydgir5qppnvejte

Incorporating environmental evaluation and thermal properties of concrete mix designs

Mehdi Robati, Timothy J. McCarthy, Georgios Kokogiannakis
2016 Construction and Building Materials  
This study correlates the impacts of selecting a concrete mix design in terms of CO 2 -e with resulting thermal conductivity and density at the design stage of buildings.  ...  This study correlates the impacts of selecting a concrete mix design in terms of CO2-e with resulting thermal conductivity and density at the design stage of buildings.  ...  practice database) [5] and AusLCI [6] .  ... 
doi:10.1016/j.conbuildmat.2016.10.092 fatcat:x26xk7yj7vaaxflq4saurmxn4i

Integration of Simulation Driven DfAM and LCC Analysis for Decision Making in L-PBF

Patricia Nyamekye, Anna Unt, Antti Salminen, Heidi Piili
2020 Metals  
Practical case studies of L-PBF are discussed and analysis of the interrelating factors of the different life phases are presented.  ...  The article provides a review of simulation driven design for additive manufacturing (simulation driven DfAM) and LCC for metallic L-PBF processes and examines the state of the art to outline the merits  ...  Acknowledgments: Authors would also like to express gratitude to all partners and companies of the Me3DI project and MFG4.0 project for their contributions during this study.  ... 
doi:10.3390/met10091179 fatcat:jnxs2urkyvc2rlmv64wjml7vza

Visual Language-Aided Construction Fire Safety Planning Approach in Building Information Modeling

Numan Khan, Ahmed Khairadeen Ali, Si Van-Tien Tran, Doyeop Lee, Chansik Park
2020 Applied Sciences  
It is anticipated that the proposed approach has the potential to helps the designers through its effectiveness and convenience while it could be helpful in the field for practical use.  ...  (3) Escape Route Plan (ERP) Module.  ...  In summary, the portable firefighting equipment installation plan and escape plan is saved as a single .obj file, while the machine automatically stored the bill of quantities as a .xls file.  ... 
doi:10.3390/app10051704 fatcat:n7fkid4yundb5hwgjsctolaoyy

Side-effect analysis with fast escape filter

Binxian Tao, Ju Qian, Xiaoyu Zhou
2012 Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis - SOAP '12  
To address the problem, this paper presents a new side-effect analysis approach that uses Gay and Steensgaard's fast escape analysis to filter superfluous side-effects.  ...  For the programs with pointers, the analysis can be very imprecise.  ...  Cherem and Rugina [7] propose an approach to build special escape and effect summaries for each method. They do not compute the detailed side-effect sets.  ... 
doi:10.1145/2259051.2259054 dblp:conf/pldi/TaoQZ12 fatcat:suetqieqindi7afpyuupbta72y

Quasi-static scheduling for safe futures

Armand Navabi, Xiangyu Zhang, Suresh Jagannathan
2008 Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming - PPoPP '08  
The analysis inserts lightweight barriers that block and resume threads executing futures if a dependency violation may ensue.  ...  ., execution yielded by erasing all futures), we present a new interprocedural summary-based dataflow analysis.  ...  Acknowledgements This work is supported in part by the National Science Foundation under grants CNS-0720516, CNS-0708464, CCF-0701832, CNS-0509387, and by a grant from the Intel Corporation.  ... 
doi:10.1145/1345206.1345212 dblp:conf/ppopp/NavabiZJ08 fatcat:x7c3bhgt4jdjfn4mqpwpffbgsi

Production of lightweight aggregates from mining residues, heavy metal sludge, and incinerator fly ash

Su-Chen Huang, Fang-Chih Chang, Shang-Lien Lo, Ming-Yu Lee, Chu-Fang Wang, Jyh-Dong Lin
2007 Journal of Hazardous Materials  
Microstructural analysis and toxicity characteristic leaching procedure (TCLP) were also performed.  ...  Residues from mining, fly ash from an incinerator and heavy metal sludge from an electronic waste water plant were mixed into raw aggregate pellets and fed into a tunnel kiln to be sintered and finally  ...  The surface is not completely vitrified when gas is produced, making it possible for gas to escape.  ... 
doi:10.1016/j.jhazmat.2006.09.094 pmid:17118542 fatcat:k4ouia4fhjbgfac4zaboosqbge

A Study on Fire Safety on Residential and Commercial Construction Sites

C. Sivakumar, R. Malathy, P. Sivaprakash
2018 Archives of Civil Engineering  
The lightweight construction and trusses are designed to support only their own weight. During a fire, if one fails, a domino effect happens and all fail rapidly within 5 to 10 minutes.  ...  There are various legal standards and requirements for ensuring fire safety on construction sites.  ...  Alison et al. (2002) studied various management practices and discussed the most effective practices for reducing employee injury rates.  ... 
doi:10.2478/ace-2018-0022 fatcat:o6syvmt2endzvj3i6tashbd3j4


Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Song
2007 ACM SIGOPS Operating Systems Review  
We propose a solution, called Sweeper, that provides both fast and accurate post-attack analysis and efficient recovery with low normal execution overhead.  ...  Sweeper combines several techniques. (1) Sweeper uses lightweight monitoring techniques to detect a wide array of suspicious requests, providing a first level of defense. (2) By leveraging lightweight  ...  By leveraging checkpointing and replay, we allow continuous lightweight monitoring to be combined with heavy-weight analysis.  ... 
doi:10.1145/1272998.1273010 fatcat:2a2t4klkqzbjxhnzyfmdve242e

μDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code [article]

Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu
2022 arXiv   pre-print
Due to the complexity of binary-level static analysis, most static analyzers choose to build conservative models for a selected portion of native code.  ...  Based on the result of the analyses, μDep conducts a stub generation for the related native functions to facilitate the state-of-the-art analyzer DroidSafe with fine-grained tainting behavior summaries  ...  The static analysis usually builds summaries to specify the data-flow behaviors for only a limited number of native methods.  ... 
arXiv:2112.06702v2 fatcat:27boorc76rffbhnlpahrtthyt4
« Previous Showing results 1 — 15 out of 3,856 results