The widespread use of object-oriented languages and Internet security concerns are just the beginning. Add embedded systems, multiple memory banks, highly pipelined units …
Computer Science and Applied Mathematics: Data Structures: Theory and Practice focuses on the processes, methodologies, principles, and approaches involved in data structures …
Intel SGX is a security solution promising strong and practical security guarantees for trusted computing. However, recent reports demonstrated that such security guarantees of SGX are …
J Cohen, A Nicolau - ACM Transactions on Programming Languages …, 1983 - dl.acm.org
The relative efficiencies of four compactors of varisized cells are estimated by constructing their timeformulas. These are symbolic formulas expressing execution times as functions of …
FC Monteiro, A Campilho - 2008 19th International Conference …, 2008 - ieeexplore.ieee.org
This paper proposes a new framework to image segmentation which combines edge-and region-based information with spectral techniques through the morphological algorithm of …
G Chen, R Shetty, M Kandemir… - … Symposium on High …, 2002 - ieeexplore.ieee.org
Traditionally, the Java virtual machine (JVM), the cornerstone of Java technology, is tuned for performance, taking into account that the energy consumption requires re-evaluation …
B Lang, F Dupont - ACM SIGPLAN Notices, 1987 - dl.acm.org
A mixed-strategy garbage collection algorithm is presented, which combines mark-and- sweep and copy collection. The intent is to benefit from the compacting and linearizing …
N Sachindran, JEB Moss, ED Berger - … of the 19th annual ACM SIGPLAN …, 2004 - dl.acm.org
Java is becoming an important platform for memory-constrained consumer devices such as PDAs and cellular phones, because it provides safety and portability. Since Java uses …
H Onozawa, T Ugawa, H Iwasaki - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Jonkers's threaded compaction is attractive in the context of memory-constrained embedded systems because of its space efficiency. However, it cannot be applied to a heap where …