87 results on '"G. Zorn"'
Search Results
2. Solving Data-centric Tasks using Large Language Models.
3. Participatory prompting: a user-centric research method for eliciting AI assistance opportunities in knowledge workflows.
4. ExceLint: automatically finding spreadsheet formula errors.
5. Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things.
6. Kizzle: A Signature Compiler for Detecting Exploit Kits.
7. User Interaction Models for Disambiguation in Programming by Example.
8. FlashRelate: extracting relational data from semi-structured spreadsheets using examples.
9. ExceLint: Automatically Finding Spreadsheet Formula Errors.
10. Evolving Academia/Industry Relations in Computing Research: Interim Report.
11. Rozzle: De-cloaking Internet Malware.
12. Hardware support for enforcing isolation in lock-based parallel programs.
13. Flikker: saving DRAM refresh-power through critical data partitioning.
14. JavaScript Errors in the Wild: An Empirical Study.
15. Modular Protections against Non-control Data Attacks.
16. DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing.
17. Approaches and Applications of Inductive Programming (Dagstuhl Seminar 15442).
18. Inductive programming meets the real world.
19. Detecting and tolerating asymmetric races.
20. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks.
21. Efficiently and precisely locating memory leaks and bloat.
22. Archipelago: trading address space for reliability and security.
23. Samurai: protecting critical data in unsafe languages.
24. Exterminator: automatically correcting memory errors with high probability.
25. DieHard: probabilistic memory safety for unsafe languages.
26. Modular protections against non-control data attacks.
27. Safety and Security for Intelligent Infrastructure.
28. A National Research Agenda for Intelligent Infrastructure.
29. Reconsidering custom memory allocation.
30. OOPSLA 2002: Reconsidering custom memory allocation.
31. Composing High-Performance Memory Allocators.
32. Efficient Runtime Detection and Toleration of Asymmetric Races.
33. Designing a Trace Format for Heap Allocation Events.
34. Hybridizing and Coalescing Load Value Predictors.
35. Exploring Last n Value Prediction.
36. Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs.
37. Segregating Heap Objects by Reference Behavior and Lifetime.
38. Static Methods in Hybrid Branch Prediction.
39. Exterminator: Automatically correcting memory errors with high probability.
40. Systems Computing Challenges in the Internet of Things.
41. Smart Communities Internet of Things.
42. Scalable Interfaces to Support Program Comprehension.
43. Semi-automatic, Self-adaptive Control of Garbage Collection Rates in Object Databases.
44. Garbage Collection Using a Dynamic Threatening Boundary.
45. Corpus-Based Static Branch Prediction.
46. Programming with Visual Expressions.
47. EQ: Overview of a New Language Approach for Prototyping Scientific Computation.
48. Partition Selection Policies in Object Database Garbage Collection.
49. Formal Semantics of Control in a Completely Visual Programming Language.
50. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.