咨询与建议

限定检索结果

文献类型

  • 1,986 篇 会议
  • 753 篇 期刊文献

馆藏范围

  • 2,739 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,567 篇 工学
    • 2,321 篇 计算机科学与技术...
    • 1,909 篇 软件工程
    • 332 篇 电气工程
    • 159 篇 电子科学与技术(可...
    • 135 篇 信息与通信工程
    • 128 篇 控制科学与工程
    • 38 篇 机械工程
    • 38 篇 生物工程
    • 23 篇 建筑学
    • 21 篇 光学工程
    • 20 篇 土木工程
    • 19 篇 材料科学与工程(可...
    • 19 篇 化学工程与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 12 篇 安全科学与工程
    • 10 篇 力学(可授工学、理...
  • 687 篇 理学
    • 556 篇 数学
    • 77 篇 物理学
    • 41 篇 生物学
    • 40 篇 系统科学
    • 35 篇 统计学(可授理学、...
    • 19 篇 化学
  • 302 篇 管理学
    • 201 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 22 篇 经济学
    • 21 篇 应用经济学
  • 19 篇 教育学
    • 19 篇 教育学
  • 14 篇 法学
    • 12 篇 社会学
  • 8 篇 医学
  • 3 篇 农学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 2,739 篇 program compiler...
  • 56 篇 compilers
  • 42 篇 embedded systems
  • 29 篇 java
  • 27 篇 computer archite...
  • 26 篇 parallel process...
  • 25 篇 c language
  • 23 篇 software enginee...
  • 23 篇 program diagnost...
  • 23 篇 formal specifica...
  • 22 篇 parallel program...
  • 21 篇 parallel archite...
  • 21 篇 formal verificat...
  • 19 篇 software tools
  • 19 篇 multiprocessing ...
  • 18 篇 programming
  • 18 篇 code generation
  • 17 篇 program processo...
  • 16 篇 unified modeling...
  • 15 篇 optimisation

机构

  • 12 篇 carnegie mellon ...
  • 11 篇 eth zurich
  • 10 篇 inria
  • 9 篇 university of ed...
  • 8 篇 university of ed...
  • 8 篇 peking universit...
  • 8 篇 purdue universit...
  • 7 篇 stanford univers...
  • 7 篇 microsoft resear...
  • 7 篇 univ nova lisboa...
  • 7 篇 microsoft resear...
  • 6 篇 microsoft resear...
  • 6 篇 google
  • 5 篇 university of sc...
  • 5 篇 shanghai jiao to...
  • 5 篇 meta ai united s...
  • 5 篇 department of co...
  • 5 篇 tsinghua univers...
  • 5 篇 syracuse univ sy...
  • 5 篇 univ maryland de...

作者

  • 14 篇 amarasinghe sama...
  • 13 篇 eigenmann rudolf
  • 10 篇 patrignani marco
  • 9 篇 hwu wen-mei w.
  • 9 篇 kjolstad fredrik
  • 9 篇 cohen albert
  • 9 篇 gomes luis
  • 8 篇 kandemir m
  • 8 篇 tseng chau-wen
  • 8 篇 hendren laurie j...
  • 8 篇 cummins chris
  • 8 篇 padua david
  • 8 篇 chambers craig
  • 8 篇 kennedy ken
  • 7 篇 leather hugh
  • 7 篇 kasahara hironor...
  • 7 篇 eggers susan j.
  • 7 篇 banerjee prithvi...
  • 7 篇 nicolau alexandr...
  • 7 篇 appel andrew w.

语言

  • 2,540 篇 英文
  • 170 篇 其他
  • 15 篇 中文
  • 6 篇 日文
  • 3 篇 葡萄牙文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 塞尔维亚文
检索条件"主题词=Program compilers"
2739 条 记 录,以下是31-40 订阅
排序:
Towards Realistic Results for Instrumentation-Based Profilers for JIT-Compiled Systems  21
Towards Realistic Results for Instrumentation-Based Profiler...
收藏 引用
21st ACM SIGPLAN International Conference on Managed programming Languages and Runtimes (MPLR)
作者: Burchell, Humphrey Larose, Octave Marr, Stefan Univ Kent Canterbury Kent England
Profilers are crucial tools for identifying and improving application performance. However, for language implementations with just-in-time (Jff) compilation, e.g., for Java and JavaScript, instrumentation-based profil... 详细信息
来源: 评论
On the Benefits of Knowledge Compilation for Feature-Model Analyses  24
On the Benefits of Knowledge Compilation for Feature-Model A...
收藏 引用
28th International Systems and Software Product Line Conference (SPLC)
作者: Sundermann, Chico Kuiter, Elias Hess, Tobias Raab, Heiko Krieter, Sebastian Thuem, Thomas Univ Ulm Ulm Germany Univ Magdeburg Magdeburg Germany Paderborn Univ Paderborn Germany
In practice, feature models often have up-to thousands of features and, thus, are typically infeasible to analyze manually. Hence, many different analyses have been proposed which often rely on multiple computationall... 详细信息
来源: 评论
Verified Validation for Affine Scheduling in Polyhedral Compilation  18th
Verified Validation for Affine Scheduling in Polyhedral Comp...
收藏 引用
18th International Conference on Theoretical Aspects of Software Engineering (TASE)
作者: Li, Xuyang Liang, Hongjin Feng, Xinyu Nanjing Univ State Key Lab Novel Software Technol Nanjing 210023 Jiangsu Peoples R China
Structural nested loops can be abstracted into polyhedral models, based on which one can perform aggressive loop optimizations;however, the optimizations are often heuristic and complex, and therefore error-prone. Mea... 详细信息
来源: 评论
Mangrove: A Scalable Framework for Folding-Based SNARKs  44th
Mangrove: A Scalable Framework for Folding-Based SNARKs
收藏 引用
44th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)
作者: Nguyen, Wilson Datta, Trisha Chen, Binyi Tyagi, Nirvan Boneh, Dan Stanford Univ Stanford CA 94305 USA
We present a framework for building efficient folding-based SNARKs. First we develop a new "uniformizing" compiler for NP statements that converts any poly-time computation to a sequence of identical simple ... 详细信息
来源: 评论
SoK: On the Effectiveness of Control-Flow Integrity in Practice  18
SoK: On the Effectiveness of Control-Flow Integrity in Pract...
收藏 引用
18th USENIX WOOT Conference on Offensive Technologies (WOOT)
作者: Becker, Lucas Hollick, Matthias Classen, Jiska Tech Univ Darmstadt Darmstadt Germany Univ Potsdam Hasso Plattner Inst Potsdam Germany
Complex programs written in memory-unsafe languages tend to contain memory corruption bugs. Adversaries commonly employ code-reuse attacks to exploit these bugs. Control-flow Integrity (CFI) enforcement schemes try to... 详细信息
来源: 评论
MonoNN: Enabling a New Monolithic Optimization Space for Neural Network Inference Tasks on Modern GPU-Centric Architectures  18
MonoNN: Enabling a New Monolithic Optimization Space for Neu...
收藏 引用
18th USENIX Symposium on Operating Systems Design and Implementation (OSDI)
作者: Zhuang, Donglin Zheng, Zhen Xia, Haojun Qiu, Xiafei Bai, Junjie Lin, Wei Song, Shuaiwen Leon Univ Sydney Camperdown NSW Australia Alibaba Grp Hangzhou Peoples R China
In this work, we reveal that the kernel-by-kernel execution scheme in the existing machine learning optimizing compilers is no longer effective in fully utilizing hardware resources provided by the advances of modern ... 详细信息
来源: 评论
Secure Synthesis of Distributed Cryptographic Applications  37
Secure Synthesis of Distributed Cryptographic Applications
收藏 引用
37th IEEE Computer Security Foundations Symposium (CSF)
作者: Acay, Cosku Gancher, Joshua Recto, Rolph Myers, Andrew C. Cornell Univ Ithaca NY 14850 USA Carnegie Mellon Univ Pittsburgh PA USA
Developing secure distributed systems is difficult, and even harder when advanced cryptography must be used to achieve security goals. Following prior work, we advocate using secure program partitioning to synthesize ... 详细信息
来源: 评论
StepCoder: Improving Code Generation with Reinforcement Learning from Compiler Feedback  62
StepCoder: Improving Code Generation with Reinforcement Lear...
收藏 引用
62nd Annual Meeting of the Association-for-Computational-Linguistics (ACL) / Student Research Workshop (SRW)
作者: Dou, Shihan Liu, Yan Jia, Haoxiang Zhou, Enyu Xiong, Limao Shan, Junjie Huang, Caishuang Wang, Xiao Fan, Xiaoran Xi, Zhiheng Zhou, Yuhao Ji, Tao Zheng, Rui Zhang, Qi Gui, Tao Huang, Xuanjing Fudan Univ Sch Comp Sci Shanghai Peoples R China Huazhong Univ Sci & Technol Wuhan Peoples R China KTH Royal Inst Technol Stockholm Sweden Fudan Univ Inst Modern Languages & Linguist Shanghai Peoples R China Shanghai Collaborat Innovat Ctr Intelligent Visua Shanghai Peoples R China
The advancement of large language models (LLMs) has significantly propelled the field of code generation. Previous work integrated reinforcement learning (RL) with compiler feedback for exploring the output space of L... 详细信息
来源: 评论
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks  33
Divide and Surrender: Exploiting Variable Division Instructi...
收藏 引用
33rd USENIX Security Symposium
作者: Schroeder, Robin Leander Gast, Stefan Guo, Qian Fraunhofer SIT Darmstadt Germany Fraunhofer Austria Vienna Austria Graz Univ Technol Graz Austria Lund Univ Lund Sweden
We uncover a critical side-channel vulnerability in the Hamming Quasi-Cyclic (HQC) round 4 optimized implementation arising due to the use of the modulo operator. In some cases, compilers optimize uses of the modulo o... 详细信息
来源: 评论
PFHaD: Page Fault Handler Assisted Defense Against Data-Oriented Attacks  3rd
PFHaD: Page Fault Handler Assisted Defense Against Data-Orie...
收藏 引用
3rd International Conference on Advances in Computing Research, ACR 2025
作者: Zhang, Tianning Huang, Hao School of Computer Jiangsu University of Science and Technology Zhenjiang China Department of Computer Science and Technology Nanjing University Nanjing China
As memory corruption vulnerabilities evolve, attackers have shifted focus from traditional control-flow attacks to non-control data attacks, which manipulate data influencing a program′s behavior without altering its... 详细信息
来源: 评论