Vikram Adve
Cited by
Cited by
LLVM: A compilation framework for lifelong program analysis & transformation
C Lattner, V Adve
International Symposium on Code Generation and Optimization, 2004. CGO 2004 …, 2004
A type and effect system for deterministic parallel Java
RL Bocchino Jr, VS Adve, D Dig, SV Adve, S Heumann, R Komuravelli, ...
Proceedings of the 24th ACM SIGPLAN conference on Object oriented …, 2009
Understanding the propagation of hard errors to software and implications for resilient system design
ML Li, P Ramachandran, SK Sahoo, SV Adve, VS Adve, Y Zhou
ACM Sigplan Notices 43 (3), 265-276, 2008
Making context-sensitive points-to analysis with heap cloning practical for the real world
C Lattner, A Lenharth, V Adve
ACM SIGPLAN Notices 42 (6), 278-289, 2007
Backwards-compatible array bounds checking for C with very low overhead
D Dhurjati, V Adve
Proceedings of the 28th international conference on Software engineering …, 2006
Parallel programming must be deterministic by default
RL Bocchino, V Adve, S Adve, M Snir
Usenix HotPar 6, 2009
Automatic pool allocation: improving performance by controlling data structure layout in the heap
C Lattner, V Adve
ACM Sigplan Notices 40 (6), 129-142, 2005
Performance analysis of mesh interconnection networks with deterministic routing
VS Adve, MK Vernon
IEEE Transactions on Parallel and Distributed Systems 5 (3), 225-246, 1994
Software transactional memory for large scale clusters
RL Bocchino, VS Adve, BL Chamberlain
Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of …, 2008
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE Symposium on Security and Privacy, 292-307, 2014
DeNovo: Rethinking the memory hierarchy for disciplined parallelism
B Choi, R Komuravelli, H Sung, R Smolinski, N Honarmand, SV Adve, ...
2011 International Conference on Parallel Architectures and Compilation …, 2011
Secure virtual architecture: A safe execution environment for commodity operating systems
J Criswell, A Lenharth, D Dhurjati, V Adve
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
Understanding integer overflow in C/C++
W Dietz, P Li, J Regehr, V Adve
ACM Transactions on Software Engineering and Methodology (TOSEM) 25 (1), 1-29, 2015
SAFECode: Enforcing alias analysis for weakly typed languages
D Dhurjati, S Kowshik, V Adve
ACM SIGPLAN Notices 41 (6), 144-157, 2006
An integrated compilation and performance analysis environment for data parallel programs
VS Adve, J Mellor-Crummey, M Anderson, K Kennedy, JC Wang, ...
Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995
Using likely program invariants to detect hardware errors
SK Sahoo, ML Li, P Ramachandran, SV Adve, VS Adve, Y Zhou
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
Using integer sets for data-parallel program analysis and optimization
V Adve, J Mellor-Crummey
Proceedings of the ACM SIGPLAN 1998 conference on Programming language …, 1998
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
Memory safety without runtime checks or garbage collection
D Dhurjati, S Kowshik, V Adve, C Lattner
Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and …, 2003
A General and Flexible Access-Control System for the Web.
L Bauer, MA Schneider, EW Felten
USENIX Security Symposium, 93-108, 2002
The system can't perform the operation now. Try again later.
Articles 1–20