Call stack

Results: 178



#Item
51Subroutines / Continuations / Control flow / Stack / Coroutine / Call-with-current-continuation / 2CC / Call stack / Software engineering / Computer programming / Computing

BRICS Basic Research in Computer Science BRICS RSO. Danvy: Formalizing Implementation Strategies for First-Class Continuations Formalizing Implementation Strategies for

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2003-04-03 02:29:20
52Subroutines / Control flow / Recursion / Cross-platform software / Scripting languages / Call stack / Tail call / Continuation / Stack / Software engineering / Computing / Computer programming

Implementing Continuation Marks in JavaScript John Clements Ayswarya Sundaram David Herman

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2012-08-10 19:21:32
53Programming language implementation / Call graph / Compiler / Stack / Compiler construction / Software / Computing

StackAnalyzer for C33 StackAnalyzer automatically determines the worst-case stack usage of the tasks in your application. The analysis results of the analyzed binary executable are shown as annotations in the call graph

Add to Reading List

Source URL: www.absint.com

Language: English - Date: 2015-01-19 06:15:30
54Programming language implementation / Macro / Machine code / Stack machine / Instruction set / ARM architecture / Tail call / Bytecode / Programming language / Computing / Software engineering / Computer programming

Automatic Generation of Compact Programs and Virtual Machines for Scheme Mario Latendresse Department of Computer Science Rice University

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2010-10-22 08:05:10
55Control flow / Object-oriented programming / Exception handling / Finalizer / Java / Fault injection / Stack / Software bug / Call stack / Software engineering / Computing / Computer programming

Finding and Preventing Run-Time Error Handling Mistakes Westley Weimer George C. Necula University of California, Berkeley

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2010-10-29 12:59:20
56Compiler construction / Software bugs / Programming language implementation / Subroutines / Stack / Call stack / C / Pointer / GNU Compiler Collection / Computing / Software engineering / Computer programming

Compile-time stack requirements analysis with GCC Motivation, Development, and Experiments Results Eric Botcazou, Cyrille Comar, Olivier Hainque AdaCore {botcazou, comar, hainque}@adacore.com

Add to Reading List

Source URL: www.adacore.com

Language: English
57Instruction set architectures / Zilog Z80 / Stack / Assembly language / X86 / Intel / Call stack / Return-to-libc attack / Subroutine / Computing / Software engineering / Computer programming

Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage Stephen Checkoway UC San Diego Ariel J. Feldman

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-08-10 01:55:31
58Compiler construction / LEON / Call graph / GNU Compiler Collection / Compiler / GNAT / Linux / Control flow graph / Software / Computing / Programming language implementation

StackAnalyzer for LEON2 StackAnalyzer automatically determines the worst-case stack usage of the tasks in your application. The analysis results of the analyzed binary executable are shown as annotations in the call grap

Add to Reading List

Source URL: www.absint.com

Language: English - Date: 2015-01-19 06:15:30
59Compiler construction / Compilers / ERC32 / Call graph / GNU Compiler Collection / Compiler / GNAT / Linux / Software / Computing / Programming language implementation

StackAnalyzer for ERC32 StackAnalyzer automatically determines the worst-case stack usage of the tasks in your application. The analysis results of the analyzed binary executable are shown as annotations in the call grap

Add to Reading List

Source URL: www.absint.com

Language: English - Date: 2015-01-19 06:15:29
60Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
UPDATE