An evolutionary study of configuration design and implementation in cloud systems
Many techniques were proposed for detecting software misconfigurations in cloud systems
and for diagnosing unintended behavior caused by such misconfigurations. Detection and …
and for diagnosing unintended behavior caused by such misconfigurations. Detection and …
Refined Input, Degraded Output: The Counterintuitive World of Compiler Behavior
To optimize a program, a compiler needs precise information about it. Significant effort is
dedicated to improving the ability of compilers to analyze programs, with the expectation that …
dedicated to improving the ability of compilers to analyze programs, with the expectation that …
Online recognition of peanut leaf diseases based on the data balance algorithm and deep transfer learning
Q Feng, P Xu, D Ma, G Lan, F Wang, D Wang… - Precision Agriculture, 2023 - Springer
Peanut leaf diseases that occur throughout the growth process of peanuts seriously affect
the peanut yield and quality. The timely and accurate identification and diagnosis of disease …
the peanut yield and quality. The timely and accurate identification and diagnosis of disease …
Multi-language dynamic taint analysis in a polyglot virtual machine
Dynamic taint analysis is a popular program analysis technique in which sensitive data is
marked as tainted and the propagation of tainted data is tracked in order to determine …
marked as tainted and the propagation of tainted data is tracked in order to determine …
Instruction extension of RV32I and GCC back end for Ascon lightweight cryptography algorithm
Ö Altınay, B Örs - 2021 IEEE International Conference on Omni …, 2021 - ieeexplore.ieee.org
Lightweight cryptography is useful to provide security and privacy in resource constraint
embedded devices. Latency and memory consumption are the key elements in performance …
embedded devices. Latency and memory consumption are the key elements in performance …
A study of inline assembly in solidity smart contracts
The Solidity programming language is the most widely used language for smart contract
development. Improving smart contracts' correctness, security, and performance has been …
development. Improving smart contracts' correctness, security, and performance has been …
Fast linear programming through transprecision computing on small and sparse data
A plethora of program analysis and optimization techniques rely on linear programming at
their heart. However, such techniques are often considered too slow for production use …
their heart. However, such techniques are often considered too slow for production use …
[PDF][PDF] Translating Between Graph Database Query Languages
M Marti - 2022 - research-collection.ethz.ch
ABSTRACT Graph Database Management Systems (GDBMS) store data as a graph and
allow for the efficient querying of nodes and their relationships. Their gain in popularity over …
allow for the efficient querying of nodes and their relationships. Their gain in popularity over …
Adoption and Evolution of C++
C Dragancea - 2024 - research-collection.ethz.ch
The C++ programming language has been one of the most widely used languages of the
past decades. It has also changed significantly, driven by hardware improvements and …
past decades. It has also changed significantly, driven by hardware improvements and …
GCC built-in function mechanism analysis and LoongArch-based implementation
X Chen, Y Wang, L Cai - 2022 41st Chinese Control …, 2022 - ieeexplore.ieee.org
The GUN Compiler Collection (GCC) provides thousands of built-in functions to implement
functions missing in C and to provide target-related performance optimizations. Firstly, the …
functions missing in C and to provide target-related performance optimizations. Firstly, the …