A review development of digital library resources at university level

A Kato, M Kisangiri, S Kaijage - Education Research …, 2021 - Wiley Online Library
This study considered the development, awareness, adoption, and usage of digital library
(DL) resources at the university level. To develop and implement a successful electronic …

Software architecture reconstruction for microservice systems using static analysis via graalvm native image

R Hutcheson, A Blanchard, N Lambaria… - … on Software Analysis …, 2024 - ieeexplore.ieee.org
Microservices are the mainstream architecture when designing cloud-native systems. The
performance and elastic scalability of such systems are the main attraction for many …

EF↯ CF: High Performance Smart Contract Fuzzing for Exploit Generation

M Rodler, D Paaßen, W Li, L Bernhard… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Smart contracts are increasingly being used to manage large numbers of high-value
cryptocurrency accounts. There is a strong demand for automated, efficient, and …

Beehive: Sub-second elasticity for web services with semi-faas execution

Z Zhao, M Wu, J Tang, B Zang, Z Wang… - Proceedings of the 28th …, 2023 - dl.acm.org
Function-as-a-service (FaaS), an emerging cloud computing paradigm, is expected to
provide strong elasticity due to its promise to auto-scale fine-grained functions rapidly …

Enhancing performance of cloud-based software applications with GraalVM and Quarkus

M Šipek, D Muharemagić, B Mihaljević… - 2020 43rd …, 2020 - ieeexplore.ieee.org
Increased complexity of network-based software solutions and the ever-rising number of
concurrent users forced a shift of the IT industry to cloud computing. Conventional network …

Scaling Type-Based Points-to Analysis with Saturation

C Wimmer, C Stancu, D Kozak… - Proceedings of the ACM on …, 2024 - dl.acm.org
Designing a whole-program static analysis requires trade-offs between precision and
scalability. While a context-insensitive points-to analysis is often considered a good …

SecV: Secure code partitioning via multi-language secure values

P Yuhala, P Felber, H Guiroux, JP Lozi… - Proceedings of the 24th …, 2023 - dl.acm.org
Trusted execution environments like Intel SGX provide enclaves, which offer strong security
guarantees for applications. Running entire applications inside enclaves is possible, but this …

{JITServer}: Disaggregated Caching {JIT} Compiler for the {JVM} in the Cloud

A Khrabrov, M Pirvu, V Sundaresan… - 2022 USENIX Annual …, 2022 - usenix.org
Managed runtimes such as the Java virtual machine (JVM) rely on just-in-time (JIT)
compilers to improve application performance by converting bytecodes into optimized …

Automatic specialization of third-party java dependencies

C Soto-Valero, D Tiwari, T Toady… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Large-scale code reuse significantly reduces both development costs and time. However,
the massive share of third-party code in software projects poses new challenges, especially …

AST vs. bytecode: interpreters in the age of meta-compilation

O Larose, S Kaleba, H Burchell, S Marr - Proceedings of the ACM on …, 2023 - dl.acm.org
Thanks to partial evaluation and meta-tracing, it became practical to build language
implementations that reach state-of-the-art peak performance by implementing only an …