Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,292,394 papers from all fields of science
Search
Sign In
Create Free Account
Stack-based memory allocation
Known as:
Stack
, Stack allocation
In most modern computer systems, each thread has a reserved region of memory referred to as its stack. When a function executes, it may add some of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Address space layout randomization
Application binary interface
Automatic variable
Buddy memory allocation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Who uses STACK? A survey of users of the STACK CAA system, May 2015
C. Sangwin
2015
Corpus ID: 180880391
STACK is online software which implements a question type designed to assess mathematics and is described in more detail in…
Expand
2012
2012
Software Watermarking Algorithm Based on Stack Allocation
Chen Dan
2012
Corpus ID: 63337546
Software watermarking algorithm based on stack allocation is proposed in this paper by analyzing the stack balance principle and…
Expand
2011
2011
The PowerPC 405 Memory Sentinel and Injection System
Mark B. Bucciero
,
J. Walters
,
R. Moussalli
,
Shanyuan Gao
,
M. French
IEEE 19th Annual International Symposium on Field…
2011
Corpus ID: 802849
Traditional approaches to evaluating a system's vulnerability to Single Event Upsets (SEUs) require elaborate and costly…
Expand
2008
2008
Software Implemented Detection and Recovery of Soft Errors in a Brake-by-Wire System
D. Skarin
,
J. Karlsson
Seventh European Dependable Computing Conference
2008
Corpus ID: 17385588
This paper presents an experimental study of the impact of soft errors in a prototype brake-by-wire system. To emulate the…
Expand
2005
2005
Analyzing Memory Accesses in Obfuscated x86 Executables
Michael Venable
,
Mohamed R. Chouchane
,
M. E. Karim
,
Arun Lakhotia
International Conference on Detection of…
2005
Corpus ID: 8223353
Programmers obfuscate their code to defeat manual or automated analysis. Obfuscations are often used to hide malicious behavior…
Expand
2005
2005
Certifying compilation for a language with stack allocation
Limin Jia
,
Frances Spalding
,
D. Walker
,
Neal Glew
20th Annual IEEE Symposium on Logic in Computer…
2005
Corpus ID: 5616142
This paper describes an assembly-language type system capable of ensuring memory safety in the presence of both heap and stack…
Expand
2002
2002
PennBench: a benchmark suite for embedded Java
G. Chen
,
M. Kandemir
,
N. Vijaykrishnan
,
M. J. Irwin
IEEE International Workshop on Workload…
2002
Corpus ID: 18397425
Currently, there are 23 million Java-enabled handsets with more than 50 different models from 17-plus suppliers. With the growing…
Expand
1995
1995
Efficient Closure Utilisation by Higher-Order Inheritance Analysis
Markus Mohnen
Sensors Applications Symposium
1995
Corpus ID: 7814728
Higher-order functions and the ability to create new functions at runtime, either by partial application or λ-abstraction of…
Expand
1991
1991
Register Windows and User-Space Threads on the SPARC
David Keppel
1991
Corpus ID: 57803940
Multiple lightweight processes or threads have multiple stacks, and a thread context switch moves execution from one stack to…
Expand
1989
1989
Reasoning about continuations with control effects
P. Jouvelot
,
D. Gifford
ACM-SIGPLAN Symposium on Programming Language…
1989
Corpus ID: 5723270
We present a new static analysis method for first-class continuations that uses an effect system to classify the control domain…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE