Vikram Adve
Cited by
Cited by
LLVM: A compilation framework for lifelong program analysis & transformation
C Lattner, V Adve
International symposium on code generation and optimization, 2004. CGO 2004 …, 2004
A type and effect system for deterministic parallel Java
RL Bocchino Jr, VS Adve, D Dig, SV Adve, S Heumann, R Komuravelli, ...
Proceedings of the 24th ACM SIGPLAN conference on Object oriented …, 2009
Understanding the propagation of hard errors to software and implications for resilient system design
ML Li, P Ramachandran, SK Sahoo, SV Adve, VS Adve, Y Zhou
ACM Sigplan Notices 43 (3), 265-276, 2008
Making context-sensitive points-to analysis with heap cloning practical for the real world
C Lattner, A Lenharth, V Adve
ACM SIGPLAN Notices 42 (6), 278-289, 2007
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE symposium on security and privacy, 292-307, 2014
Backwards-compatible array bounds checking for C with very low overhead
D Dhurjati, V Adve
Proceedings of the 28th international conference on Software engineering …, 2006
Parallel programming must be deterministic by default
RL Bocchino, V Adve, S Adve, M Snir
Usenix HotPar 6 (10.5555), 1, 2009
Automatic pool allocation: improving performance by controlling data structure layout in the heap
C Lattner, V Adve
ACM Sigplan Notices 40 (6), 129-142, 2005
DeNovo: Rethinking the memory hierarchy for disciplined parallelism
B Choi, R Komuravelli, H Sung, R Smolinski, N Honarmand, SV Adve, ...
2011 International Conference on Parallel Architectures and Compilation …, 2011
Understanding integer overflow in C/C++
W Dietz, P Li, J Regehr, V Adve
ACM Transactions on Software Engineering and Methodology (TOSEM) 25 (1), 1-29, 2015
Performance analysis of mesh interconnection networks with deterministic routing
VS Adve, MK Vernon
IEEE Transactions on Parallel and Distributed Systems 5 (3), 225-246, 1994
Software transactional memory for large scale clusters
RL Bocchino, VS Adve, BL Chamberlain
Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of …, 2008
Secure virtual architecture: A safe execution environment for commodity operating systems
J Criswell, A Lenharth, D Dhurjati, V Adve
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
SAFECode: Enforcing alias analysis for weakly typed languages
D Dhurjati, S Kowshik, V Adve
ACM SIGPLAN Notices 41 (6), 144-157, 2006
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
Using likely program invariants to detect hardware errors
SK Sahoo, ML Li, P Ramachandran, SV Adve, VS Adve, Y Zhou
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
Nested kernel: An operating system architecture for intra-kernel privilege separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
An integrated compilation and performance analysis environment for data parallel programs
VS Adve, J Mellor-Crummey, M Anderson, JC Wang, DA Reed, ...
Proceedings of the 1995 ACM/IEEE Conference on Supercomputing, 50-es, 1995
Memory safety without runtime checks or garbage collection
D Dhurjati, S Kowshik, V Adve, C Lattner
Proceedings of the 2003 ACM SIGPLAN conference on language, compiler, and …, 2003
Efficiently detecting all dangling pointer uses in production servers
D Dhurjati, V Adve
International Conference on Dependable Systems and Networks (DSN'06), 269-280, 2006
The system can't perform the operation now. Try again later.
Articles 1–20