Call stack

Known as: Runtime stack, Function stack, Display register 
In computer science, a call stack is a stack data structure that stores information about the active subroutines of a computer program. This kind of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1961-2017
05010019612017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Most programming languages support a call stack in the programming model and also in the runtime system.We show that for… (More)
  • figure 3
  • figure 4
  • figure 5
  • figure 6
  • figure 8
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Graphical user interfaces (GUIs) are used as front ends to most of today's software applications. The event-driven nature of GUIs… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2005
2005
We present an architecture and algorithms for performing automated software problem determination using call-stack matching. In… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
2005
2005
Test suite reduction is an important test maintenance activity that attempts to reduce the size of a test suite with respect to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
An important correctness criterion for software running on embedded microcontrollers is stack safety: a guarantee that the call… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Stack inspection is a security mechanism implemented in runtimes such as the JVM and the CLR to accommodate components with… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Stack Smashing Attacks Arash Baratloo and Navjot Singh farash,singhg@research.bell-labs.com Bell Labs Research, Lucent… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive… (More)
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1991
Highly Cited
1991
The Priority Ceiling Protocol (PCP) of Sha, Rajkumar and Lehoczky is a policy for locking binary semaphores that bounds priority… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 8
Is this relevant?