


default search action
14. CC 2005: Edinburgh, Scotland, UK (Part of ETAPS 2005)
- Rastislav Bodík:

Compiler Construction, 14th International Conference, CC 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings. Lecture Notes in Computer Science 3443, Springer 2005, ISBN 3-540-25411-0
Invited Talk
- Andreas Zeller

:
When Abstraction Fails. 1-9
Compilation
- Sukyoung Ryu

, Norman Ramsey:
Source-Level Debugging for Multiple Languages with Modest Programming Effort. 10-26 - Luca Padovani:

Compilation of Generic Regular Path Expressions Using C++ Class Templates. 27-42 - Vladimir Gapeyev, Michael Y. Levin, Benjamin C. Pierce, Alan Schmitt:

XML Goes Native: Run-Time Representations for Xtatic. 43-58
Parallelism
- Weihua Jiang, Chao Mei, Bo Huang

, Jianhui Li, Jiahua Zhu, Binyu Zang, Chuanqi Zhu:
Boosting the Performance of Multimedia Applications Using SIMD Instructions. 59-75 - Robert Ennals, Richard Sharp, Alan Mycroft:

Task Partitioning for Multi-core Network Processors. 76-90 - Sven Verdoolaege, Kristof Beyls, Maurice Bruynooghe, Francky Catthoor:

Experiences with Enumeration of Integer Projections of Parametric Polytopes. 91-105 - Christopher Barton, Arie Tal, Bob Blainey, José Nelson Amaral:

Generalized Index-Set Splitting. 106-120
Memory Management
- Harel Paz, Erez Petrank, Stephen M. Blackburn:

Age-Oriented Concurrent Garbage Collection. 121-136 - Yair Sade, Shmuel Sagiv, Ran Shaham:

Optimizing C Multithreaded Memory Management Using Thread-Local Storage. 137-155 - Harel Paz, Erez Petrank, David F. Bacon, Elliot K. Kolodner, V. T. Rajan:

An Efficient On-the-Fly Cycle Collection. 156-171
Program Transformations
- Jeremy Condit, George C. Necula:

Data Slicing: Separating the Heap into Independent Regions. 172-187 - Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richard R. Brooks:

A Compiler-Based Approach to Data Security. 188-203 - Karina Olmos, Eelco Visser

:
Composing Source-to-Source Data-Flow Transformations with Rewriting Strategies and Dependent Dynamic Rewrite Rules. 204-220 - K. C. Shashidhar, Maurice Bruynooghe, Francky Catthoor, Gerda Janssens:

Verification of Source Code Transformations by Program Equivalence Checking. 221-236
Tool Demonstrations
- Patrick Lam, Viktor Kuncak

, Martin C. Rinard:
Hob: A Tool for Verifying Data Structure Consistency. 237-241 - Jonathan Misurda, James A. Clause, Juliya L. Reed, Bruce R. Childers, Mary Lou Soffa:

Jazz: A Tool for Demand-Driven Structural Testing. 242-245 - Kevin Casey, David Gregg, M. Anton Ertl:

Tiger - An Interpreter Generation Tool. 246-249 - Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, Tim Teitelbaum:

CodeSurfer/x86-A Platform for Analyzing x86 Executables. 250-254
Pointer Analysis
- Feng Qian, Laurie J. Hendren:

A Study of Type Analysis for Speculative Method Inlining in a JIT Environment. 255-270 - Jingling Xue, Phung Hua Nguyen:

Completeness Analysis for Incomplete Object-Oriented Programs. 271-286 - Anatole Le, Ondrej Lhoták, Laurie J. Hendren:

Using Inter-Procedural Side-Effect Information in JIT Optimizations. 287-304

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














