Results 1 - 10
of
4,442
Supporting Control-Flow-Dependent Execution Times on WCET Calculation
, 2000
"... Embedded computer systems commonly interact with the environment. There may be some realtime constraints imposed on this interaction. To guaranteesuchconstraints the knowledge about the worst case execution time (WCET) of the system components is mandatory. In the last years several concepts have be ..."
Abstract
-
Cited by 4 (3 self)
- Add to MetaCart
Embedded computer systems commonly interact with the environment. There may be some realtime constraints imposed on this interaction. To guaranteesuchconstraints the knowledge about the worst case execution time (WCET) of the system components is mandatory. In the last years several concepts have been developed to obtain the WCET statically by code analysis or dynamically by measurements. In this paper we describe a method for static WCET analysis. This methodisbased on analysis with implicit path enumeration by the use of linear programming. This is a quite efficient approach with respect to the analysis time. We present a graph based formalism to analyze programs. This formalism handles in a smart way the different execution times of conditional instructions whether the branch is taken or not. This approach enables the calculation of tight WCET result with small effort.
Empirical Analysis for Investigating the Effect of Control Flow Dependencies on Testability
- of Classes,” 23rd International Conference on Software Engineering and Knowledge Engineering, Miami Beach
, 2011
"... Abstract ─ We present, in this paper, a new metric capturing in an integrated way different attributes of object-oriented systems. The metric uses basically control flow paths and probabilities. It captures the interactions between classes and related control. The study presented in this paper aims ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract ─ We present, in this paper, a new metric capturing in an integrated way different attributes of object-oriented systems. The metric uses basically control flow paths and probabilities. It captures the interactions between classes and related control. The study presented in this paper aims
Control-Flow Analysis of Higher-Order Languages
, 1991
"... representing the official policies, either expressed or implied, of ONR or the U.S. Government. Keywords: data-flow analysis, Scheme, LISP, ML, CPS, type recovery, higher-order functions, functional programming, optimising compilers, denotational semantics, nonstandard Programs written in powerful, ..."
Abstract
-
Cited by 365 (10 self)
- Add to MetaCart
that runs slower than their FORTRAN and C counterparts. The problem is the lack of an explicit control-flow graph at compile time, something which traditional data-flow analysis techniques require. In this dissertation, I present a technique for recovering the control-flow graph of a Scheme program
The program dependence graph and its use in optimization
- ACM Transactions on Programming Languages and Systems
, 1987
"... In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit both the data and control dependence5 for each operation in a program. Data dependences have been used to represent only the relevant data flow relationships of a program. ..."
Abstract
-
Cited by 996 (3 self)
- Add to MetaCart
In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit both the data and control dependence5 for each operation in a program. Data dependences have been used to represent only the relevant data flow relationships of a program
Efficiently computing static single assignment form and the control dependence graph
- ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS
, 1991
"... In optimizing compilers, data structure choices directly influence the power and efficiency of practical program optimization. A poor choice of data structure can inhibit optimization or slow compilation to the point that advanced optimization features become undesirable. Recently, static single ass ..."
Abstract
-
Cited by 1003 (8 self)
- Add to MetaCart
assignment form and the control dependence graph have been proposed to represent data flow and control flow propertiee of programs. Each of these previously unrelated techniques lends efficiency and power to a useful class of program optimization. Although both of these structures are attractive
Cognitive networks
- IN PROC. OF IEEE DYSPAN 2005
, 2005
"... This paper presents a definition and framework for a novel type of adaptive data network: the cognitive network. In a cognitive network, the collection of elements that make up the network observes network conditions and then, using prior knowledge gained from previous interactions with the network ..."
Abstract
-
Cited by 1106 (7 self)
- Add to MetaCart
with the network, plans, decides and acts on this information. Cognitive networks are different from other “intelligent ” communication technologies because these actions are taken with respect to the end-to-end goals of a data flow. In addition to the cognitive aspects of the network, a specification language
Control-Flow Decoupling
"... Mobile and PC/server class processor companies continue to roll out flagship core microarchitectures that are faster than their prede-cessors. Meanwhile placing more cores on a chip coupled with con-stant supply voltage puts per-core energy consumption at a premium. Hence, the challenge is to find f ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
propose control-flow decoupling (CFD) to eradicate mispredictions of separable branches. The idea is to separate the loop containing the branch into two loops: the first contains only the branch’s predicate computation and the second contains the branch and its control-dependent instructions. The first
Opaque control-flow integrity.
- In 22nd Annual Network and Distributed System Security Symposium, NDSS,
, 2015
"... Abstract-A new binary software randomization and ControlFlow Integrity (CFI) enforcement system is presented, which is the first to efficiently resist code-reuse attacks launched by informed adversaries who possess full knowledge of the inmemory code layout of victim programs. The defense mitigates ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
, the more IDs must be stored and checked at each branch. Moreover, perfect CFI cannot be realized with a purely static control-flow graph; for example, the permissible destinations of function returns depend on the calling context, which is only known at runtime. Fine-grained CFI therefore implements a
The Determinants of Credit Spread Changes.
- Journal of Finance
, 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract
-
Cited by 422 (2 self)
- Add to MetaCart
-grade bond yield changes on Treasury yield changes and stock returns (see Kwan (1996)) we find that the R 2 falls to five percent when the dependent variable is credit spread changes. Hence, while much is known about yield changes, we have very limited knowledge about the determinants of credit spread
The Use of Control-Flow and Control Dependence in Software Tools
, 1993
"... Program development, debugging, and maintenance can be greatly improved by the use of software tools that provide information about program behavior. This thesis focuses on a number of useful software tools and shows how their efficiency, generality, and precision can be increased through the use of ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
of control-flow and control dependence analysis. We consider two classes of tools: execution measurement tools, which collect information about a particular program execution; and program analysis tools, which provide information about potential program behavior by statically analyzing the program. We
Results 1 - 10
of
4,442