Search for dissertations about: "Compiler Construction"
Showing result 16 - 20 of 20 swedish dissertations containing the words Compiler Construction.
-
16. Program Analysis for Performance and Reliability
Abstract : The increased demand for computing power has lead designers to put an ever increasing number of cores on processor dies. This advance has been made possible through miniaturization and effectivization of the underlying semi-conductor technology. As a by-product, however, the resulting computer systems are more vulnerable to interference. READ MORE
-
17. Verification Based Failure Detection for Real-Time Java and Floating-Point Computations
Abstract : To err is human, and machines help us avoiding errors. This thesis presents two ways, based on verification technology, to prevent failures.Safety critical Real-Time Java applications usually need a certification. Tests fulfilling specific coverage criteria can be part of such certification, like in the DO-178 standard. READ MORE
-
18. Type Based Techniques for Covert Channel Elimination and Register Allocation
Abstract : As the title suggests, this thesis consists of two parts that address two rather different topics. The first part investigates secure information flow in sequential programs, with the aim of completely eliminating covert timing channels. The second part presents a technique to describe register allocation for a functional language. READ MORE
-
19. High-Level GPU Programming: Domain-Specific Optimization and Inference
Abstract : When writing computer software one is often forced to balance the need for high run-time performance with high programmer productivity. By using a high-level language it is often possible to cut development times, but this typically comes at the cost of reduced run-time performance. READ MORE
-
20. Generating Optimized and Secure Binary Code
Abstract : The increased digitalization of modern societies has resulted in a proliferation of a broad spectrum of embedded devices, ranging from personal smartphones and heart pacemakers to large-scale industrial IoT systems. Since they often handle various sensitive data, these devices increasingly become the targets of cyberattacks that threaten the integrity of personal data, financial security, and sometimes even people’s safety. READ MORE