Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,335,434 papers from all fields of science
Search
Sign In
Create Free Account
Shadow memory
Known as:
Shadow (disambiguation)
Shadow memory is a technique used to track and store information on computer memory used by a program during its execution. Shadow memory consists of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
AddressSanitizer
Binary translation
Clang
Computer memory
Expand
Broader (1)
Memory management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
ФОРМАЛЬНАЯ МОДЕЛЬ ОБНАРУЖЕНИЯ ПРОГРАММНЫХ ОШИБОК С ПОМОЩЬЮ СИМВОЛЬНОГО ИСПОЛНЕНИЯ ПРОГРАММ
А И Герасимов
,
Даниил Олегович Куц
,
А. А. Новиков
2019
Corpus ID: 214335884
An automatic program defect detection is extremely important direction of current research and development in the field of…
Expand
2015
2015
Hardware support for Local Memory Transactions on GPU Architectures
Alejandro Villegas
,
A. Navarro
,
Rafael Asenjo-Plaza
,
O. Plata
,
R. Ubal
,
D. Kaeli
2015
Corpus ID: 15665974
Graphics Processing Units (GPUs) are popular hardware accelerators for data-parallel applications, enabling the execution of…
Expand
2014
2014
SIFT: Low-Complexity Energy-Efficient Information Flow Tracking on SMT Processors
Meltem Ozsoy
,
Dmitry Ponomarev
,
N. Abu-Ghazaleh
,
Tameesh Suri
IEEE transactions on computers
2014
Corpus ID: 260488822
Dynamic information flow tracking (DIFT) is a powerful technique that can protect unmodified binaries from a broad range of…
Expand
2010
2010
Exploring Multiple Execution Paths Based on Dynamic Lazy Analysis: Exploring Multiple Execution Paths Based on Dynamic Lazy Analysis
Kai Chen
,
Deng-Guo Feng
,
Pu-rui Su
2010
Corpus ID: 63406196
Review
2010
Review
2010
Umbra – A Tutorial from client share detect
Qin Zhao
,
Syed Raza
2010
Corpus ID: 18973925
Umbra is an efficient and scalable memory shadowing tool built on top of DynamoRIO, which is a state-ofthe-art runtime code…
Expand
2007
2007
Magnetic Random Access Memory for Embedded Computing
G. Donohoe
2007
Corpus ID: 107314948
Abstract : The goal of this research was to develop an embedded magnetic memory technology to be integrated into Complementary…
Expand
2005
2005
Method and device for accessing data of a message memory of a communication component
프란츠 바일러
,
플로리안 하르트비히
,
크리스티안 호르스트
2005
Corpus ID: 65178640
The present invention relates to a method and apparatus for accessing data in by outputting the data from the message memory…
Expand
2001
2001
Hold time algorithm, logic analyzer and emulation circuit having a shadow memory
ウィリアム,シー カーレル
,
スウェイ−ヤン シェイ
,
ワン ミンヤン
2001
Corpus ID: 64669914
To provide a logical element that can solve the timing issue. A RAM, lookup tables, a circuit for the emulation system comprising…
Expand
1998
1998
Increasing TLB reach using superpages backed by shadow memory
SwansonMark
,
StollerLeigh
,
CarterJohn
1998
Corpus ID: 215878433
The amount of memory that can be accessed without causing a TLB fault, the reach of a TLB, is failing to keep pace with the…
Expand
1996
1996
Shadow Memory. Sur Dominique Rolin
Maria Medina
1996
Corpus ID: 187119436
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE