Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,729,607 papers from all fields of science
Search
Sign In
Create Free Account
Stack-based memory allocation
Known as:
Stack
, Stack allocation
In most modern computer systems, each thread has a reserved region of memory referred to as its stack. When a function executes, it may add some of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Address space layout randomization
Application binary interface
Automatic variable
Buddy memory allocation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Who uses STACK? A survey of users of the STACK CAA system, May 2015
C. Sangwin
2015
Corpus ID: 180880391
STACK is online software which implements a question type designed to assess mathematics and is described in more detail in…
Expand
2012
2012
Software Watermarking Algorithm Based on Stack Allocation
Chen Dan
2012
Corpus ID: 63337546
Software watermarking algorithm based on stack allocation is proposed in this paper by analyzing the stack balance principle and…
Expand
2011
2011
The PowerPC 405 Memory Sentinel and Injection System
Mark B. Bucciero
,
J. Walters
,
R. Moussalli
,
Shanyuan Gao
,
M. French
IEEE 19th Annual International Symposium on Field…
2011
Corpus ID: 802849
Traditional approaches to evaluating a system's vulnerability to Single Event Upsets (SEUs) require elaborate and costly…
Expand
2005
2005
Analyzing Memory Accesses in Obfuscated x86 Executables
Michael Venable
,
Mohamed R. Chouchane
,
M. E. Karim
,
Arun Lakhotia
International Conference on Detection of…
2005
Corpus ID: 8223353
Programmers obfuscate their code to defeat manual or automated analysis. Obfuscations are often used to hide malicious behavior…
Expand
2005
2005
Certifying compilation for a language with stack allocation
Limin Jia
,
Frances Spalding
,
D. Walker
,
Neal Glew
20th Annual IEEE Symposium on Logic in Computer…
2005
Corpus ID: 5616142
This paper describes an assembly-language type system capable of ensuring memory safety in the presence of both heap and stack…
Expand
2002
2002
PennBench: a benchmark suite for embedded Java
G. Chen
,
M. Kandemir
,
N. Vijaykrishnan
,
M. J. Irwin
IEEE International Workshop on Workload…
2002
Corpus ID: 18397425
Currently, there are 23 million Java-enabled handsets with more than 50 different models from 17-plus suppliers. With the growing…
Expand
2001
2001
Pointer analysis and its applications for Java programs
Alexandru Salcianu
2001
Corpus ID: 408222
This thesis investigates the design and the correctness of a pointer analysis for the Java programming language. Although the…
Expand
2000
2000
C++ Exception Handling for IA64
Christophe de Dinechin
USENIX Workshop on Industrial Experiences with…
2000
Corpus ID: 11416100
The C++ programming language offers a feature known as exception handling, which is used, for instance, to report error…
Expand
1995
1995
Efficient Closure Utilisation by Higher-Order Inheritance Analysis
Markus Mohnen
Sensors Applications Symposium
1995
Corpus ID: 7814728
Higher-order functions and the ability to create new functions at runtime, either by partial application or λ-abstraction of…
Expand
1991
1991
Register Windows and User-Space Threads on the SPARC
David Keppel
1991
Corpus ID: 57803940
Multiple lightweight processes or threads have multiple stacks, and a thread context switch moves execution from one stack to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE