ECMon
- 20 June 2009
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 37 (3), 349-360
- https://doi.org/10.1145/1555754.1555798
Abstract
No abstract availableKeywords
This publication has 33 references indexed in Scilit:
- Runtime monitoring on multicores via OASESACM SIGOPS Operating Systems Review, 2009
- How to shadow every byte of memory used by a programPublished by Association for Computing Machinery (ACM) ,2007
- RakshaPublished by Association for Computing Machinery (ACM) ,2007
- An integrated hardware-software approach to flexible transactional memoryPublished by Association for Computing Machinery (ACM) ,2007
- An effective hybrid transactional memory system with strong isolation guaranteesPublished by Association for Computing Machinery (ACM) ,2007
- Adaptive Software Transactional MemoryLecture Notes in Computer Science, 2005
- Secure program execution via dynamic information flow trackingPublished by Association for Computing Machinery (ACM) ,2004
- Speculative synchronizationPublished by Association for Computing Machinery (ACM) ,2002
- Informing memory operationsACM Transactions on Computer Systems, 1998
- EraserACM Transactions on Computer Systems, 1997