An evolutionary study of configuration design and implementation in cloud systems

Y Zhang, H He, O Legunsen, S Li… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Many techniques were proposed for detecting software misconfigurations in cloud systems
and for diagnosing unintended behavior caused by such misconfigurations. Detection and …

Refined Input, Degraded Output: The Counterintuitive World of Compiler Behavior

T Theodoridis, Z Su - Proceedings of the ACM on Programming …, 2024 - dl.acm.org
To optimize a program, a compiler needs precise information about it. Significant effort is
dedicated to improving the ability of compilers to analyze programs, with the expectation that …

Online recognition of peanut leaf diseases based on the data balance algorithm and deep transfer learning

Q Feng, P Xu, D Ma, G Lan, F Wang, D Wang… - Precision Agriculture, 2023 - Springer
Peanut leaf diseases that occur throughout the growth process of peanuts seriously affect
the peanut yield and quality. The timely and accurate identification and diagnosis of disease …

Multi-language dynamic taint analysis in a polyglot virtual machine

J Kreindl, D Bonetta, L Stadler… - Proceedings of the 17th …, 2020 - dl.acm.org
Dynamic taint analysis is a popular program analysis technique in which sensitive data is
marked as tainted and the propagation of tainted data is tracked in order to determine …

Instruction extension of RV32I and GCC back end for Ascon lightweight cryptography algorithm

Ö Altınay, B Örs - 2021 IEEE International Conference on Omni …, 2021 - ieeexplore.ieee.org
Lightweight cryptography is useful to provide security and privacy in resource constraint
embedded devices. Latency and memory consumption are the key elements in performance …

A study of inline assembly in solidity smart contracts

S Chaliasos, A Gervais, B Livshits - Proceedings of the ACM on …, 2022 - dl.acm.org
The Solidity programming language is the most widely used language for smart contract
development. Improving smart contracts' correctness, security, and performance has been …

Fast linear programming through transprecision computing on small and sparse data

T Grosser, T Theodoridis, M Falkenstein… - Proceedings of the …, 2020 - dl.acm.org
A plethora of program analysis and optimization techniques rely on linear programming at
their heart. However, such techniques are often considered too slow for production use …

[PDF][PDF] Translating Between Graph Database Query Languages

M Marti - 2022 - research-collection.ethz.ch
ABSTRACT Graph Database Management Systems (GDBMS) store data as a graph and
allow for the efficient querying of nodes and their relationships. Their gain in popularity over …

Adoption and Evolution of C++

C Dragancea - 2024 - research-collection.ethz.ch
The C++ programming language has been one of the most widely used languages of the
past decades. It has also changed significantly, driven by hardware improvements and …

GCC built-in function mechanism analysis and LoongArch-based implementation

X Chen, Y Wang, L Cai - 2022 41st Chinese Control …, 2022 - ieeexplore.ieee.org
The GUN Compiler Collection (GCC) provides thousands of built-in functions to implement
functions missing in C and to provide target-related performance optimizations. Firstly, the …