• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 105
Next 10 →

Local Reasoning about Programs that Alter Data Structures

by Peter O'Hearn, John Reynolds, Hongseok Yang , 2001
"... We describe an extension of Hoare's logic for reasoning about programs that alter data structures. We consider a low-level storage model based on a heap with associated lookup, update, allocation and deallocation operations, and unrestricted address arithmetic. The assertion language is ba ..."
Abstract - Cited by 324 (28 self) - Add to MetaCart
We describe an extension of Hoare's logic for reasoning about programs that alter data structures. We consider a low-level storage model based on a heap with associated lookup, update, allocation and deallocation operations, and unrestricted address arithmetic. The assertion language

Model Checking Dynamic Allocation and Deallocation

by Dino Distefano, Arend Rensink, Joost-pieter Katoen , 2002
"... This paper proposes Allocational Temporal Logic (ATL) as a formalism to express properties concerning the dynamic allocation (birth) and de-allocation (death) of entities, such as the objects in an object-based system. The logic is interpreted on History-Dependent Automata, extended with a symbolic ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
representation for certain cases of unbounded allocation. The paper also presents a simple imperative language with primitive statements for (de)allocation, with an operational semantics, to demonstrate the kind of behaviour that can be modelled. The main contribution of the paper is a tableau-based model

Software-directed register deallocation for simultaneous multithreaded processors

by Jack L. Lo, Sujay S. Parekh, Susan J. Eggers, Henry M. Levy, Dean M. Tullsen - IEEE Transactions on Parallel and Distributed Systems , 1999
"... This paper proposes and evaluates software techniques that increase register file utilization for simultaneous multithreading (SMT) processors. SMT processors require large register files to hold multiple thread contexts that can issue instructions, out of order, every cycle. By supporting better in ..."
Abstract - Cited by 33 (5 self) - Add to MetaCart
at knowing when a new physical register must be allocated, they are limited in knowing when physical registers can be deallocated. We propose architectural extensions that permit the compiler and operating system to (1) free registers immediately upon their last use, and (2) free registers allocated to idle

Efficient Memory Deallocation Techniques in Real-Time Model-Checking

by Fredrik Larsson, Paul Pettersson, Wang Yi
"... During the past few years, a number of software tools for automated analysis of real-time systems have been developed in the framework of timed automata (e.g. Kronos and Uppaal). One of the major problems in applying these tools to industrial-size systems is the huge memory-usage for state-space ex ..."
Abstract - Add to MetaCart
should be thrown away whenever possible to reduce swapping. This in turn requires memory deallocation operations. As the first contribution of this paper, we report a case study on memory allocation and deallocation behaviour of verification tools for real time systems. We discovered that deallocating

Shredding your garbage: Reducing data lifetime through secure deallocation

by Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum - In USENIX Security , 2005
"... Today’s operating systems, word processors, web browsers, and other common software take no measures to promptly remove data from memory. Consequently, sensitive data, such as passwords, social security numbers, and confidential documents, often remains in memory indefinitely, significantly increasi ..."
Abstract - Cited by 68 (0 self) - Add to MetaCart
Today’s operating systems, word processors, web browsers, and other common software take no measures to promptly remove data from memory. Consequently, sensitive data, such as passwords, social security numbers, and confidential documents, often remains in memory indefinitely, significantly

Shredding Your Garbage: Reducing Data LifetimeThrough Secure Deallocation

by unknown authors
"... Abstract Today's operating systems, word processors, webbrowsers, and other common software take no measures ..."
Abstract - Add to MetaCart
Abstract Today's operating systems, word processors, webbrowsers, and other common software take no measures

Abstract Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation

by Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum
"... Today’s operating systems, word processors, web browsers, and other common software take no measures to promptly remove data from memory. Consequently, sensitive data, such as passwords, social security numbers, and confidential documents, often remains in memory indefinitely, significantly increasi ..."
Abstract - Add to MetaCart
Today’s operating systems, word processors, web browsers, and other common software take no measures to promptly remove data from memory. Consequently, sensitive data, such as passwords, social security numbers, and confidential documents, often remains in memory indefinitely, significantly

Typed Memory Management in a Calculus of Capabilities

by David Walker, Karl Crary, Greg Morrisett , 2000
"... Region-based memory management is an alternative to standard tracing garbage collection that makes potentially dangerous operations such as memory deallocation explicit but verifiably safe. In this article, we present a new compiler intermediate language, called the Capability Calculus, that supp ..."
Abstract - Cited by 208 (21 self) - Add to MetaCart
Region-based memory management is an alternative to standard tracing garbage collection that makes potentially dangerous operations such as memory deallocation explicit but verifiably safe. In this article, we present a new compiler intermediate language, called the Capability Calculus

Alias Types

by Frederick Smith, David Walker, Greg Morrisett - In European Symposium on Programming , 1999
"... Linear type systems allow destructive operations such as object deallocation and imperative updates of functional data structures. These operations and others, such as the ability to reuse memory at di#erent types, are essential in low-level typed languages. However, traditional linear type syste ..."
Abstract - Cited by 182 (23 self) - Add to MetaCart
Linear type systems allow destructive operations such as object deallocation and imperative updates of functional data structures. These operations and others, such as the ability to reuse memory at di#erent types, are essential in low-level typed languages. However, traditional linear type

A Resource-Aware Semantics and Abstract Machine for a Functional Language with Explicit Deallocation

by Manuel Montenegro, Clara Segura
"... Safe is a first-order eager language with heap regions and unusual facilities such as programmer-controlled destruction and copying of data structures. The regions are disjoint parts of the heap where the compiler may allocate data structures. Thanks to regions, a runtime garbage collector is not ne ..."
Abstract - Cited by 6 (3 self) - Add to MetaCart
is not needed. The language and its associated type system, guaranteeing that destruction facilities and region management are done in a safe way, have been presented previously. In this paper, we start from a high-level big-step operational semantics for Safe, and in a series of semi-formal steps we derive its
Next 10 →
Results 1 - 10 of 105
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University