Speculation for Parallelizing Runtime Checks
暂无分享,去创建一个
Christof Fetzer | Martin Nowack | Martin Süßkraut | Stefan Weigert | Diogo Becker de Brum | Thomas Knauth | Ute Schiffel | C. Fetzer | Thomas Knauth | D. Brum | Stefan Weigert | Ute Schiffel | Martin Süßkraut | Martin Nowack
[1] Clark Verbrugge,et al. Return Value Prediction in a Java Virtual Machine , 2004 .
[2] Erik R. Altman,et al. Proceedings of the 35th annual ACM/IEEE international symposium on Microarchitecture , 2002, MICRO 2002.
[3] Jason Flinn,et al. Parallelizing security checks on commodity hardware , 2008, ASPLOS.
[4] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[5] Olatunji Ruwase,et al. Parallelizing dynamic information flow tracking , 2008, SPAA '08.
[6] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[7] Kim M. Hazelwood,et al. SuperPin: Parallelizing Dynamic Instrumentation for Real-Time Performance , 2007, International Symposium on Code Generation and Optimization (CGO'07).
[8] Kunle Olukotun,et al. Improving the performance of speculatively parallel applications on the Hydra CMP , 1999 .
[9] Chen Ding,et al. Fast Track: A Software System for Speculative Program Optimization , 2009, 2009 International Symposium on Code Generation and Optimization.
[10] Torvald Riegel,et al. Transactifying Applications Using an Open Compiler Framework , 2007 .
[11] Gurindar S. Sohi,et al. Master/Slave Speculative Parallelization , 2002, 35th Annual IEEE/ACM International Symposium on Microarchitecture, 2002. (MICRO-35). Proceedings..
[12] Shekhar Y. Borkar,et al. Designing reliable systems from unreliable components: the challenges of transistor variability and degradation , 2005, IEEE Micro.
[13] Torvald Riegel,et al. Dynamic performance tuning of word-based software transactional memory , 2008, PPoPP.
[14] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[15] Edward J. McCluskey,et al. ED4I: Error Detection by Diverse Data and Duplicated Instructions , 2002, IEEE Trans. Computers.
[16] Antonia Zhai,et al. A scalable approach to thread-level speculation , 2000, Proceedings of 27th International Symposium on Computer Architecture (IEEE Cat. No.RS00201).
[17] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[18] Antonia Zhai,et al. Improving value communication for thread-level speculation , 2002, Proceedings Eighth International Symposium on High Performance Computer Architecture.
[19] Christof Fetzer,et al. AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware , 2009, SAFECOMP.
[20] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[21] Kunle Olukotun,et al. STAMP: Stanford Transactional Applications for Multi-Processing , 2008, 2008 IEEE International Symposium on Workload Characterization.