*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 7*number_thousands_separator*016

1

WebAssembly: Yes, but for What?
Wingo, Andy
Communications of the ACM. Nov2025, Vol. 68 Issue 11, p50-54. 5p.

APPLICATION program inte... ARTIFICIAL intelligence DATA security SOURCE code COMPILERS (Computer prog... BINARY codes
*Periodical*
2

Automatic Compiler Tuning for Inlining with Machine Learning.
Huang, Da ; Shi, Xiaohua ; Feng, Yuchen ; et al.
International Journal of Pattern Recognition & Artificial Intelligence. Sep2025, Vol. 39 Issue 11, p1-21. 21p.

MACHINE learning COMPILERS (Computer prog... BENCHMARK problems (Comp... OPTIMIZATION algorithms SIMULATED annealing ENSEMBLE learning
*Academic Journal*
3

Abstractions, Their Algorithms, and Their Compilers.
AHO, ALFRED ; ULLMAN, JEFFREY
Communications of the ACM. Feb2022, Vol. 65 Issue 2, p76-91. 16p. 3 Diagrams, 2 Charts.

ALGORITHMS COMPUTER programming COMPUTER science PROGRAMMING languages COMPILERS (Computer prog... SCIENCE
*Periodical*
4

基于源代码迁移的编译器优化方法研究.
周 放 ; 刘茂福 ; 李珊枝
Computer Engineering & Science / Jisuanji Gongcheng yu Kexue. Oct2025, Vol. 47 Issue 10, p1890-1900. 11p.

DEEP learning COMPILERS (Computer prog... MATHEMATICAL optimizatio... PROGRAM transformation FLOWGRAPHS
*Academic Journal*
5

Automatically Translating C to Rust.
Hong, Jaemin ; Ryu, Sukyoung
Communications of the ACM; Nov2025, Vol. 68 Issue 11, p58-65, 8p

C (Computer program lang... PROGRAMMING languages COMPUTER programming LEGACY systems COMPILERS (Computer prog... LANGUAGE models
*Periodical*
6

A Comprehensive Approach to Rustc Optimization Vulnerability Detection in Industrial Control Systems.
Xie, Kaifeng ; Wan, Jinjing ; Chen, Lifeng ; et al.
Mathematics (2227-7390). Aug2025, Vol. 13 Issue 15, p2459. 20p.

INDUSTRIAL controls manu... COMPILERS (Computer prog... DYNAMIC testing QUALITY assurance LANGUAGE models RISK assessment
*Academic Journal*
7

A COMPILER APPROACH TO PHARMACOVIGILANCE.
Christopher, Mani Kitgwim ; Nyap, Davou Choji ; Blamah, Nachamada Vachaku ; et al.
Science World Journal. 2025, Vol. 20 Issue 3, p1308-1312. 5p.

COMPILERS (Computer prog... DRUG side effects ELECTRONIC data processi... MACHINE learning MEDICATION safety RANDOM forest algorithms
*Academic Journal*
8

WASP: Stack protection for WebAssembly.
Massey, Ewan ; Olivier, Pierre
Journal of Systems Architecture. Mar2026, Vol. 172, pN.PAG-N.PAG. 1p.

COMPUTER security vulner... SECURITY management COMPILERS (Computer prog... COMPUTER performance
*Academic Journal*
9

Optimizations in C++ Compilers.
GODBOLT, MATT
Communications of the ACM. Feb2020, Vol. 63 Issue 2, p41-49. 9p.

C++ C (Computer program lang... COMPILERS (Computer prog... PROGRAM transformation CODE generators
*Periodical*
10

SLTP: A Symbolic Travel-Planning Agent Framework with Decoupled Translation and Heuristic Tree Search.
Tang, Debin ; Jiang, Qian ; Yang, Jingpu ; et al.
Electronics (2079-9292); Jan2026, Vol. 15 Issue 2, p422, 23p

TRAVEL planning LANGUAGE models MACHINE learning HEURISTIC COMPILERS (Computer prog... KNOWLEDGE transfer
*Academic Journal*
11

Type-Theory of Algorithms with Chain-Free Memory and Iterative Computations.
Loukanova, Roussanka
Journal of Applied Logics- IfCoLog Journal of Logics & their Applications (FLAP); Jan2026, Vol. 13 Issue 1, p155-173, 19p

ALGORITHMS RECURSION theory MATHEMATICAL simplificat... ITERATIVE methods (Mathe... PROGRAMMING languages COMPILERS (Computer prog...
*Academic Journal*
12

Assessment of Multicore Processor Soft Error Reliability Using BBRO‐DNN and SSF‐FIS Models.
Jadhav, Usha ; Malathi, P.
Concurrency & Computation: Practice & Experience; Jan2026, Vol. 38 Issue 1, p1-32, 32p

MULTICORE processors SOFT errors RELIABILITY in engineeri... COMPILERS (Computer prog... VIRTUAL machine systems FAILURE analysis
*Academic Journal*
13

Heuristics Analyses of Smart Contracts Bytecodes and Their Classifications.
Udokwu, Chibuzor ; Mirhosseini, Seyed Amid Moeinzadeh ; Craß, Stefan
Electronics (2079-9292); Jan2026, Vol. 15 Issue 1, p41, 19p

CLASSIFICATION RISK assessment COMPILERS (Computer prog... COMPUTER security vulner... BLOCKCHAINS
*Academic Journal*
14

Orchestrating optimization passes of machine learning compiler for reducing memory footprints of computation graphs.
Yu, Qianwei ; Nie, Pengbo ; Wang, Zihan ; et al.
Journal of Systems Architecture. Apr2026, Vol. 173, pN.PAG-N.PAG. 1p.

MATHEMATICAL optimizatio... SCHEDULING COMPUTER memory manageme... COMPILERS (Computer prog... GRAPH algorithms DEEP learning
*Academic Journal*
15

Fuzzing JavaScript JIT compilers with a high-quality differential test oracle.
Li, Jizhe ; Xu, Haoran ; Wang, Yongjun ; et al.
Computers & Security. Dec2025, Vol. 159, pN.PAG-N.PAG. 1p.

DEFECT tracking (Compute... JAVASCRIPT programming l... COMPILERS (Computer prog... COMPUTER software testin... SOFTWARE failures DYNAMIC testing
*Academic Journal*
16

Practical Verification of Peephole Optimizations with Alive.
Lopes, Nuno P. ; Menendez, David ; Nagarakatte, Santosh ; et al.
Communications of the ACM. Feb2018, Vol. 61 Issue 2, p84-91. 8p. 6 Diagrams, 2 Charts.

COMPUTER programming PROGRAMMING languages COMPILERS (Computer prog... DEBUGGING CODING theory
*Periodical*
17

Constraint-Efficient Comparators via Weighted Accumulation.
Guzmán-Albiol, Marc ; Bellés-Muñoz, Marta ; Genés-Durán, Rafael ; et al.
Mathematics (2227-7390); Dec2025, Vol. 13 Issue 24, p3959, 25p

COMPARATOR circuits BINARY number system CONSTRAINT satisfaction ALGORITHMS COMPILERS (Computer prog... CONSTRAINT programming
*Academic Journal*
18

Survey of techniques to detect common weaknesses in program binaries.
Adhikari, Ashish ; Kulkarni, Prasad
Cyber Security & Applications; Dec2025, Vol. 3, p1-14, 14p

COMPUTER security vulner... COMPILERS (Computer prog... PENETRATION testing (Com... OPEN source software
*Academic Journal*
19

Legacy Code, Live Risk: Empirical Evidence of Malware Detection Gaps.
Huang, Gang-Cheng ; Lai, Tai-Hung
Applied Sciences (2076-3417); Nov2025, Vol. 15 Issue 22, p11862, 18p

MALWARE PROGRAMMING languages LEGACY systems COMPILERS (Computer prog... MALWARE prevention INTERNET security
*Academic Journal*
20

Register‐Based and Stack‐Based Virtual Machines: Which Perform Better in JIT Compilation Scenarios?
Šimek, Bohuslav ; Fiala, Dalibor ; Dostal, Martin
Software: Practice & Experience; Nov2025, Vol. 55 Issue 11, p1896-1910, 15p

VIRTUAL machine systems COMPUTER performance BENCHMARK problems (Comp... COMPUTER architecture COMPILERS (Computer prog...
*Academic Journal*

*Filter*