Year |
Citation |
Score |
2019 |
Berger E, Blackburn SM, Brodley C, Jagadish HV, McKinley KS, Nascimento MA, Shin M, Wang K, Xie L. GOTO rankings considered helpful Communications of the Acm. 62: 29-30. DOI: 10.1145/3332803 |
0.609 |
|
2016 |
Gandhi J, Karakostas V, Ayar F, Cristal A, Hill MD, McKinley KS, Nemirovsky M, Swift MM, Ünsal OS. Range Translations for Fast Virtual Memory Ieee Micro. 36: 118-126. DOI: 10.1109/Mm.2016.10 |
0.341 |
|
2015 |
Bornholt J, Mytkowicz T, McKinley KS. Uncertain<T>: Abstractions for Uncertain Hardware and Software Ieee Micro. 35: 132-143. DOI: 10.1109/Mm.2015.52 |
0.321 |
|
2014 |
Porter DE, Bond MD, Roy I, McKinley KS, Witchel E. Practical fine-grained information flow control using laminar Acm Transactions On Programming Languages and Systems. 37. DOI: 10.1145/2638548 |
0.645 |
|
2014 |
Lee B, Hirzel M, Grimm R, Mckinley KS. Debugging mixed-environment programs with Blink Software - Practice and Experience. DOI: 10.1002/Spe.2276 |
0.378 |
|
2013 |
Berger ED, Zorn BG, McKinley KS. Reconsidering custom memory allocation Acm Sigplan Notices. 48: 46-57. DOI: 10.1145/2502508.2502522 |
0.686 |
|
2012 |
Esmaeilzadeh H, Cao T, Yang X, Blackburn SM, McKinley KS. Looking back and looking forward: Power, performance, and upheaval Communications of the Acm. 55: 105-114. DOI: 10.1145/2209249.2209272 |
0.346 |
|
2012 |
Esmaeilzadeh H, Cao T, Yang X, Blackburn S, McKinley K. What is happening to power, performance, and software? Ieee Micro. 32: 110-121. DOI: 10.1109/Mm.2012.20 |
0.324 |
|
2011 |
Srivastava V, Bond MD, McKinley KS, Shmatikov V. A security policy oracle: Detecting security holes using multiple API implementations Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 343-354. DOI: 10.1145/1993498.1993539 |
0.548 |
|
2011 |
Meng N, Kim M, McKinley KS. Systematic editing: Generating program transformations from an example Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 329-342. DOI: 10.1145/1993498.1993537 |
0.308 |
|
2011 |
Jibaja I, Blackburn SM, Haghighat MR, McKinley KS. Deferred gratification: Engineering for high performance garbage collection from the get go Proceedings of the 2011 Acm Sigplan Workshop On Memory Systems Performance and Correctness, Mspc 2011. 58-65. DOI: 10.1145/1988915.1988930 |
0.325 |
|
2011 |
Maher BA, Coons KE, McKinley KS, Burger D. The good block: Hardware/software design for composable, block-atomic processors Proceedings - Annual Workshop On Interaction Between Compilers and Computer Architectures, Interact. 9-16. DOI: 10.1109/INTERACT.2011.17 |
0.48 |
|
2010 |
Bond MD, Srivastava V, McKinley KS, Shmatikov V. Efficient, context-sensitive detection of real-world semantic attacks Proceedings of the Acm Sigplan 5th Workshop On Programming Languages and Analysis For Security, Plas 2010. DOI: 10.1145/1814217.1814218 |
0.635 |
|
2010 |
Bond MD, Coons KE, McKinley KS. Pacer: Proportional detection of data races Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 255-268. DOI: 10.1145/1806596.1806626 |
0.525 |
|
2010 |
Jump M, McKinley KS. Detecting memory leaks in managed languages with Cork Software - Practice and Experience. 40: 1-22. DOI: 10.1002/Spe.V40:1 |
0.717 |
|
2009 |
Roy I, Porter DE, Bond MD, McKinley KS, Witchel E. Laminar: Practical fine-grained decentralized information flow control Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 63-74. DOI: 10.1145/1542476.1542484 |
0.623 |
|
2009 |
Subramanian S, Hicks M, McKinley KS. Dynamic software updates: A VM-centric approach Acm Sigplan Notices. 44: 1-12. DOI: 10.1145/1542476.1542478 |
0.339 |
|
2009 |
Bond MD, McKinley KS. Leak Pruning Acm Sigplan Notices. 44: 277-288. DOI: 10.1145/1508244.1508277 |
0.64 |
|
2008 |
Bond MD, McKinley KS. Tolerating Memory Leaks Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 109-125. DOI: 10.1145/1449764.1449774 |
0.656 |
|
2008 |
Blackburn SM, McKinley KS, Garner R, Hoffmann C, Khan AM, Bentzur R, Diwan A, Feinberg D, Frampton D, Guyer SZ, Hirzel M, Hosking A, Jump M, Lee H, Moss JEB, et al. Wake up and smell the coffee: Evaluation methodology for the 21st century Communications of the Acm. 51: 83-89. DOI: 10.1145/1378704.1378723 |
0.688 |
|
2008 |
Sartor JB, Hirzel M, McKinley KS. No bit left behind: The limits of heap data compression International Symposium On Memory Management, Ismm. 111-120. DOI: 10.1145/1375634.1375651 |
0.311 |
|
2007 |
Bond MD, Nethercote N, Kent SW, Guyer SZ, McKinley KS. Tracking bad apples: Reporting the origin of null and undefined value errors Acm Sigplan Notices. 42: 405-422. DOI: 10.1145/1297027.1297057 |
0.601 |
|
2007 |
Bond MD, McKinley KS. Probabilistic calling context Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 97-111. DOI: 10.1145/1297027.1297035 |
0.636 |
|
2007 |
Jump M, McKinley KS. Cork: Dynamic memory leak detection for garbage-collected languages Acm Sigplan Notices. 42: 31-38. DOI: 10.1145/1190216.1190224 |
0.382 |
|
2007 |
Blackburn SM, Hertz M, McKinley KS, Moss JEB, Yang T. Profile-based pretenuring Acm Transactions On Programming Languages and Systems. 29. DOI: 10.1145/1180475.1180477 |
0.416 |
|
2007 |
Lee B, Resnick K, Bond MD, McKinley KS. Correcting the dynamic call graph using control-flow constraints Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4420: 80-95. |
0.602 |
|
2006 |
Bond MD, McKinley KS. Bell: Bit-encoding online memory leak detection Acm Sigplan Notices. 41: 61-72. DOI: 10.1145/1168857.1168866 |
0.609 |
|
2006 |
Hertz M, Blackburn SM, Moss JEB, McKinley KS, Stefanovic D. Generating object lifetime traces with Merlin Acm Transactions On Programming Languages and Systems. 28: 476-516. DOI: 10.1145/1133651.1133654 |
0.379 |
|
2006 |
Guyer SZ, McKinley KS, Frampton D. Free-Me: A static analysis for automatic individual object reclamation Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 2006: 364-375. DOI: 10.1145/1133255.1134024 |
0.331 |
|
2006 |
Maher BA, Smith A, Burger D, McKinley KS. Merging head and tail duplication for convergent hyperblock formation Proceedings of the Annual International Symposium On Microarchitecture, Micro. 65-76. DOI: 10.1109/MICRO.2006.34 |
0.515 |
|
2006 |
Agaram KK, Keckler SW, Lin C, McKinley KS. The memory behavior of data structures in C SPEC CPU2000 benchmarks 2006 Spec Benchmark Workshop. |
0.308 |
|
2005 |
Bond MD, McKinley KS. Continuous path and edge profiling Proceedings of the Annual International Symposium On Microarchitecture, Micro. 130-140. DOI: 10.1109/MICRO.2005.16 |
0.588 |
|
2005 |
Bond MD, McKinley KS. Practical path profiling for dynamic optimizers Proceedings of the 2005 International Symposium On Code Generation and Optimization, Cgo 2005. 2005: 205-216. DOI: 10.1109/CGO.2005.28 |
0.588 |
|
2005 |
Gaboon B, McKinley KS. Recurrence analysis for effective array prefetching in Java Concurrency Computation Practice and Experience. 17: 589-616. DOI: 10.1002/Cpe.851 |
0.442 |
|
2004 |
Huang X, Blackburn SM, McKinley KS, Moss JEB, Wang Z, Cheng P. The garbage collection advantage: Improving program locality Acm Sigplan Notices. 39: 69-80. DOI: 10.1145/1035292.1028983 |
0.344 |
|
2004 |
Burger D, Keckler SW, McKinley KS, Dahlin M, John LK, Lin C, Moore CR, Burrill J, McDonald RG, Yoder W. Scaling to the end of silicon with EDGE architectures Computer. 37: 44-55. DOI: 10.1109/Mc.2004.65 |
0.306 |
|
2003 |
Lu Z, McKinley KS. Partial collection replication for information retrieval Information Retrieval. 6: 159-198. DOI: 10.1023/A:1023947204209 |
0.323 |
|
2003 |
Wang Z, Burger D, McKinley KS, Reinhardt SK, Weems CC. Guided region prefetching: A cooperative hardware/software approach Conference Proceedings - Annual International Symposium On Computer Architecture, Isca. 388-398. |
0.301 |
|
2002 |
Cahoon B, McKinley KS. Simple and effective array prefetching in Java Proceedings of the Joint Acm Java Grande - Iscope Conference. 86-95. |
0.336 |
|
2001 |
Diwan A, McKinley KS, Moss JEB. Using types to analyze and optimize object-oriented programs Acm Transactions On Programming Languages and Systems. 23: 30-72. DOI: 10.1145/383721.383732 |
0.435 |
|
2001 |
Cahoon B, McKinley KS. Data flow analysis for software prefetching linked data structures in Java Parallel Architectures and Compilation Techniques - Conference Proceedings, Pact. 280-291. |
0.302 |
|
2001 |
Berger ED, Zorn BG, McKinley KS. Composing high-performance memory allocators Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 114-124. |
0.626 |
|
2000 |
Cahoon B, McKinley KS, Lu Z. Evaluating the performance of distributed architectures for information retrieval using a variety of workloads Acm Transactions On Information Systems. 18: 1-43. DOI: 10.1145/333135.333136 |
0.358 |
|
2000 |
Berger ED, McKinley KS, Blumofe RD, Wilson PR. Hoard: A scalable memory allocator for multithreaded applications International Conference On Architectural Support For Programming Languages and Operating Systems - Asplos. 117-128. |
0.323 |
|
1999 |
McKinley KS, Temam O. Quantifying Loop Nest Locality Using SPEC'95 and the Perfect Benchmarks Acm Transactions On Computer Systems. 17: 288-336. DOI: 10.1145/329466.329484 |
0.37 |
|
1998 |
McKinley KS. A compiler optimization algorithm for shared-memory multiprocessors Ieee Transactions On Parallel and Distributed Systems. 9: 769-787. DOI: 10.1109/71.706049 |
0.406 |
|
1997 |
Singhai SK, Mckinley KS. A parametrized loop fusion algorithm for improving parallelism and cache locality Computer Journal. 40. DOI: 10.1093/Comjnl/40.6.340 |
0.353 |
|
1996 |
McKinley KS, Carr S, Tseng C. Improving data locality with loop transformations Acm Transactions On Programming Languages and Systems (Toplas). 18: 424-453. DOI: 10.1145/233561.233564 |
0.413 |
|
1996 |
Weaver GE, Weems CC, McKinley KS. Compiling high-level languages for configurable computers: applying lessons from heterogeneous processing Proceedings of Spie. 2914: 249-258. DOI: 10.1117/12.255822 |
0.413 |
|
1996 |
Mckinley KS, Carr S, Tseng CW. Improving Data Locality with Loop Transformations Acm Transactions On Programming Languages and Systems. 18: 424-453. |
0.305 |
|
1994 |
Carr S, McKinley KS, Tseng CW. Compiler Optimizations for Improving Data Locality Acm Sigplan Notices. 29: 252-262. DOI: 10.1145/195470.195557 |
0.31 |
|
1993 |
Kennedy K, McKinley KS, Tseng C. Analysis and transformation in an interactive parallel programming tool Concurrency: Practice and Experience. 5: 575-602. DOI: 10.1002/Cpe.4330050705 |
0.372 |
|
1991 |
Kennedy K, McKinley KS, Tseng CW. Interactive Parallel Programming Using the ParaScope Editor Ieee Transactions On Parallel and Distributed Systems. 2: 329-341. DOI: 10.1109/71.86108 |
0.377 |
|
Show low-probability matches. |