A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
Inserting Safe Memory Reuse Commands into ML-Like Programs
[chapter]
2003
Lecture Notes in Computer Science
We present a static analysis that estimates reusable memory cells and a source-level transformation that adds explicit memory-reuse commands into the program text. ...
For benchmark ML programs, our analysis and transformation achieves the memory reuse ratio from 5.2% to 91.3%. ...
Overview Our goal is to automatically insert explicit memory-reuse commands into MLlike programs so that they should not blindly request memory when constructing data. ...
doi:10.1007/3-540-44898-5_10
fatcat:jyxdtsi66nhnpmrzdisj3f7jza
Static insertion of safe and effective memory reuse commands into ML-like programs
2005
Science of Computer Programming
We present a static analysis that estimates reusable memory cells and a source-level transformation that adds explicit memory reuse commands into the program text. ...
For benchmark ML programs, our analysis and transformation system achieves a memory reuse ratio from 5.2% to 91.3% and reduces the memory peak from 0.0% to 71.9%. ...
Overview Our goal is to automatically insert explicit memory reuse commands into ML-like programs so that they do not blindly request memory when constructing data. ...
doi:10.1016/j.scico.2005.02.007
fatcat:d2zpmze2zre5hmwtojdqlx4myy
Experiments on the effectiveness of an automatic insertion of memory reuses into ML-like programs
2004
Proceedings of the 4th international symposium on Memory management - ISMM '04
We present extensive experimental results on our static analysis and source-level transformation [12, 11] that adds explicit memory-reuse commands into ML program text. ...
The transformed programs reuse 3.8% to 88.6% of total allocated memory cells, and the memory peak is reduced by 0.0% to 71.9%. ...
ANALYSIS AND TRANSFORMATION We first briefly explain our analysis and transformation that adds safe memory reuse commands into ML-like programs [12] . ...
doi:10.1145/1029873.1029885
dblp:conf/iwmm/LeeY04
fatcat:lppcozzetvd67itc3uyc4xnvya
Author Index
2005
Science of Computer Programming
Yi, Static insertion of safe and effective memory reuse commands into ML-like programs (1-2) 141-178 Lin, C., see S., R., E. Yahav, E.K. Kolodner and M. ...
Sagiv, Establishing local temporal heap safety properties with applications to compiletime memory management (1-2) 264-289 Shanneb, A., J. Potter and J. ...
doi:10.1016/s0167-6423(05)00127-9
fatcat:uyc7m35yxrcohmotmhu73ggziq
Static Analysis Symposium 2003
2005
Science of Computer Programming
Hermenegildo, Germán Puebla, Francisco Bueno and Pedro López-García -Static insertion of safe and effective memory reuse commands into ML-like programs Oukseh Lee, Hongseok Yang and Kwangkeun Yi -Abstract ...
Static Analysis is a research area aimed at developing principles and tools for verification and semantics-based manipulation of programs and high performance implementations of programming languages. ...
doi:10.1016/j.scico.2005.04.002
fatcat:icjf2bhuqjdlhl4krepcuwbco4
Traceable data types for self-adjusting computation
2010
Proceedings of the 2010 ACM SIGPLAN conference on Programming language design and implementation - PLDI '10
structure, it requires keeping a large computation trace (often proportional to the runtime of the program on the current input), and it introduces moderately large constant factors in practice. ...
We develop a semantics for tracing, extend an existing self-adjusting language, ΔML, and its implementation to support traceable data types, and present an experimental evaluation by considering a number ...
The Tgt Language The ΔML language (Section 2) is compiled into the Tgt language by the ΔML compiler. ...
doi:10.1145/1806596.1806650
dblp:conf/pldi/AcarBLTT10
fatcat:olkft5pnabhahk3gw7bh7ir74u
Traceable data types for self-adjusting computation
2010
SIGPLAN notices
structure, it requires keeping a large computation trace (often proportional to the runtime of the program on the current input), and it introduces moderately large constant factors in practice. ...
We develop a semantics for tracing, extend an existing self-adjusting language, ΔML, and its implementation to support traceable data types, and present an experimental evaluation by considering a number ...
The Tgt Language The ΔML language (Section 2) is compiled into the Tgt language by the ΔML compiler. ...
doi:10.1145/1809028.1806650
fatcat:sivghn244ve3tgwuff422f5zty
Memory safety without runtime checks or garbage collection
2003
Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and tool for embedded systems - LCTES '03
subclass of type-safe C programs. ...
Traditional approaches to enforcing memory safety of programs rely heavily on runtime checks of memory accesses and on garbage collection, both of which are unattractive for embedded applications. ...
Safe languages like Java [10] , Modula-3, ML, Safe-C [1] , Cyclone [13] and CCured [22] use a variety of runtime checks before individual memory operations such as bounds checks for array references ...
doi:10.1145/780742.780743
fatcat:bf53xshuvjfyfa4zjuhsivgkfm
Memory safety without runtime checks or garbage collection
2003
SIGPLAN notices
subclass of type-safe C programs. ...
Traditional approaches to enforcing memory safety of programs rely heavily on runtime checks of memory accesses and on garbage collection, both of which are unattractive for embedded applications. ...
Safe languages like Java [10] , Modula-3, ML, Safe-C [1] , Cyclone [13] and CCured [22] use a variety of runtime checks before individual memory operations such as bounds checks for array references ...
doi:10.1145/780731.780743
fatcat:3m44vcvcovb6fo6g5jm2ihk6y4
Memory safety without runtime checks or garbage collection
2003
Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and tool for embedded systems - LCTES '03
subclass of type-safe C programs. ...
Traditional approaches to enforcing memory safety of programs rely heavily on runtime checks of memory accesses and on garbage collection, both of which are unattractive for embedded applications. ...
Safe languages like Java [10] , Modula-3, ML, Safe-C [1] , Cyclone [13] and CCured [22] use a variety of runtime checks before individual memory operations such as bounds checks for array references ...
doi:10.1145/780732.780743
dblp:conf/lctrts/DhurjatiKAL03
fatcat:zxqiboecfnat5cdb47eizpn5ly
Compiling self-adjusting programs with continuations
2008
SIGPLAN notices
We validate the feasibility of our proposal by extending Standard ML and by integrating the transformation into MLton, a whole-program optimizing compiler for Standard ML. ...
Rewriting an ordinary program into a self-adjusting program with these primitives, however, can be difficult and error-prone due to various monadic and proper-usage restrictions, some of which cannot be ...
Section 5 shows how ASrc programs are compiled into SATgt programs by a cps transformation that uses ASrc annotations to insert primitives for selfadjusting computation. ...
doi:10.1145/1411203.1411249
fatcat:dani5lnjizgufoke3rwvyw4fuq
Compiling self-adjusting programs with continuations
2008
Proceeding of the 13th ACM SIGPLAN international conference on Functional programming - ICFP '08
We validate the feasibility of our proposal by extending Standard ML and by integrating the transformation into MLton, a whole-program optimizing compiler for Standard ML. ...
Rewriting an ordinary program into a self-adjusting program with these primitives, however, can be difficult and error-prone due to various monadic and proper-usage restrictions, some of which cannot be ...
Section 5 shows how ASrc programs are compiled into SATgt programs by a cps transformation that uses ASrc annotations to insert primitives for selfadjusting computation. ...
doi:10.1145/1411204.1411249
dblp:conf/icfp/Ley-WildFA08
fatcat:cmaoz3prwrhabkfmohrtnncm7e
Differential Datalog
2019
Datalog
However, the execution model of DDlog is fully incremental : at runtime DDlog programs receive streams of changes to the input relations (insertions or deletions) and produce streams of corresponding changes ...
A DDlog programmer writes traditional, non-incremental Datalog programs. ...
The compiler also generates a command-line interface program (CLI) that allows users to interact with the DDlog program directly via a command line or a script. ...
dblp:conf/datalog/RyzhykB19
fatcat:s3t5vtdoxvcvlh3aelemi5w2ay
Open-hardware wireless controller and 3D-printed pumps for efficient liquid manipulation
2021
HardwareX
The programming of the microcontroller is performed on the Arduino IDE. ...
We would like to thank Gwenaël Gain for providing cell cultures and Nicolas Juste for his participation in the device development and validation during his internship. ...
The two fixed calibration values (ml/turn and thread/mm) must first be entered in the JSON and imported into the SPIFF memory. ...
doi:10.1016/j.ohx.2021.e00199
pmid:35601242
pmcid:PMC9121357
fatcat:batrclortfcebcdkrxtrfinkwu
Secure virtual architecture
2007
ACM SIGOPS Operating Systems Review
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. ...
A virtual machine implementing SVA achieves these goals by using a novel approach that exploits properties of existing memory pools in the kernel and by preserving the kernel's explicit control over memory ...
Acknowledgements We would like to thank our shepherd, Adrian Perrig, and the anonymous reviewers for their extensive and helpful feedback on the paper. ...
doi:10.1145/1323293.1294295
fatcat:735u6minbvdk3bipx53qhavhri
« Previous
Showing results 1 — 15 out of 1,227 results