[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 11 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Control-flow analysis of functional programs
Article No.: 10, Pages 1–33https://doi.org/10.1145/2187671.2187672

We present a survey of control-flow analysis of functional programs, which has been the subject of extensive investigation throughout the past 30 years. Analyses of the control flow of functional programs have been formulated in multiple settings and ...

research-article
Mitigating program security vulnerabilities: Approaches and challenges
Article No.: 11, Pages 1–46https://doi.org/10.1145/2187671.2187673

Programs are implemented in a variety of languages and contain serious vulnerabilities which might be exploited to cause security breaches. These vulnerabilities have been exploited in real life and caused damages to related stakeholders such as program ...

research-article
A vocabulary of program slicing-based techniques
Article No.: 12, Pages 1–41https://doi.org/10.1145/2187671.2187674

This article surveys previous work on program slicing-based techniques. For each technique, we describe its features, its main applications, and a common example of slicing using such a technique. After discussing each technique separately, all of them ...

research-article
Recent thermal management techniques for microprocessors
Article No.: 13, Pages 1–42https://doi.org/10.1145/2187671.2187675

Microprocessor design has recently encountered many constraints such as power, energy, reliability, and temperature. Among these challenging issues, temperature-related issues have become especially important within the past several years. We summarize ...

research-article
A review of recent advances in 3D ear- and expression-invariant face biometrics
Article No.: 14, Pages 1–34https://doi.org/10.1145/2187671.2187676

Biometric-based human recognition is rapidly gaining popularity due to breaches of traditional security systems and the lowering cost of sensors. The current research trend is to use 3D data and to combine multiple traits to improve accuracy and ...

research-article
Processing flows of information: From data stream to complex event processing
Article No.: 15, Pages 1–62https://doi.org/10.1145/2187671.2187677

A large number of distributed applications requires continuous and timely processing of information as it flows from the periphery to the center of the system. Examples include intrusion detection systems which analyze network traffic in real-time to ...

research-article
Behavioral interface specification languages
Article No.: 16, Pages 1–58https://doi.org/10.1145/2187671.2187678

Behavioral interface specification languages provide formal code-level annotations, such as preconditions, postconditions, invariants, and assertions that allow programmers to express the intended behavior of program modules. Such specifications are ...

research-article
Runtime countermeasures for code injection attacks against C and C++ programs
Article No.: 17, Pages 1–28https://doi.org/10.1145/2187671.2187679

The lack of memory safety in C/C++ often leads to vulnerabilities. Code injection attacks exploit these vulnerabilities to gain control over the execution flow of applications. These attacks have played a key role in many major security incidents. ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.