Search Results - "Palsberg, Jens"

Refine Results
  1. 1

    Optimal implementation of quantum gates with two controls by Palsberg, Jens, Yu, Nengkun

    Published in Linear algebra and its applications (01-08-2024)
    “…We give a detailed proof of a well-known theorem in quantum computing. The theorem characterizes the number of two-qubit gates that is necessary for…”
    Get full text
    Journal Article
  2. 2

    Fast and Precise Application Code Analysis using a Partial Library by Utture, Akshay, Palsberg, Jens

    “…Long analysis times are a key bottleneck for the widespread adoption of whole-program static analysis tools. Fortunately, however, a user is often only…”
    Get full text
    Conference Proceeding
  3. 3

    Low-Overhead Deadlock Prediction by Cai, Yan, Meng, Ruijie, Palsberg, Jens

    “…Multithreaded programs can have deadlocks, even after deployment, so users may want to run deadlock tools on deployed programs. However, current deadlock…”
    Get full text
    Conference Proceeding
  4. 4

    Striking a Balance: Pruning False-Positives from Static Call Graphs by Utture, Akshay, Liu, Shuyang, Kalhauge, Christian Gram, Palsberg, Jens

    “…Researchers have reported that static analysis tools rarely achieve a false-positive rate that would make them attractive to developers. We overcome this…”
    Get full text
    Conference Proceeding
  5. 5
  6. 6

    Improving the effectiveness of system verification: Guest editors’ introduction to special section by Hermanns, Holger, Palsberg, Jens

    “…This special section presents three extended and revised papers which originally appeared in the proceedings of the 12th edition of the conference “Tools and…”
    Get full text
    Journal Article
  7. 7
  8. 8
  9. 9

    Aliased register allocation for straight-line programs is NP-complete by Lee, Jonathan K., Palsberg, Jens, Pereira, Fernando Magno Quintão

    Published in Theoretical computer science (06-11-2008)
    “…Register allocation is NP-complete in general but can be solved in linear time for straight-line programs where each variable has at most one definition point…”
    Get full text
    Journal Article
  10. 10

    Deadline analysis of interrupt-driven software by Brylow, D., Palsberg, J.

    Published in IEEE transactions on software engineering (01-10-2004)
    “…Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical…”
    Get full text
    Journal Article
  11. 11

    Static checking of interrupt-driven software by Brylow, D., Damgaard, N., Palsberg, J.

    “…Resource-constrained devices are becoming ubiquitous. Examples include cell phones, Palm Pilots and digital thermostats. It can be difficult to fit the…”
    Get full text
    Conference Proceeding Journal Article
  12. 12

    Agnostic Protocol Translation for Cross-Domain Information Sharing by Chen Liu, Bao-Hong Shen, Oh, Soon Y., Gerla, Mario, Palsberg, Jens, Banner, Clif, Butler, Richard

    “…Network translation gateways can provide seamless interoperability among different airborne, ground and maritime domains. Effective interconnection between…”
    Get full text
    Conference Proceeding
  13. 13

    Quanto: Optimizing Quantum Circuits with Automatic Generation of Circuit Identities by Pointing, Jessica, Padon, Oded, Jia, Zhihao, Ma, Henry, Hirth, Auguste, Palsberg, Jens, Aiken, Alex

    Published 22-11-2021
    “…Existing quantum compilers focus on mapping a logical quantum circuit to a quantum device and its native quantum gates. Only simple circuit identities are used…”
    Get full text
    Journal Article
  14. 14

    Testing versus Static Analysis of Maximum Stack Size by Eslamimehr, Mahdi, Palsberg, Jens

    “…For event-driven software on resource-constrained devices, estimates of the maximum stack size can be of paramount importance. For example, a poor estimate led…”
    Get full text
    Conference Proceeding
  15. 15

    Type inference for record concatenation and subtyping by Palsberg, Jens, Zhao, Tian

    Published in Information and computation (25-02-2004)
    “…Record concatenation, multiple inheritance, and multiple-object cloning are closely related and part of various language designs. For example, in Cardelli’s…”
    Get full text
    Journal Article
  16. 16

    Complexity results for 1-safe nets by Cheng, Allan, Esparza, Javier, Palsberg, Jens

    Published in Theoretical computer science (07-08-1995)
    “…We study the complexity of several standard problems for 1-safe Petri nets and some of its subclasses. We prove that reachability, liveness, and deadlock are…”
    Get full text
    Journal Article
  17. 17
  18. 18

    Type-safe method inlining by Glew, Neal, Palsberg, Jens

    Published in Science of computer programming (01-08-2004)
    “…In a typed language such as Java, inlining of virtual methods does not always preserve typability. The best known solution to this problem is to insert type…”
    Get full text
    Journal Article
  19. 19

    Quartz: Superoptimization of Quantum Circuits (Extended Version) by Xu, Mingkuan, Li, Zikun, Padon, Oded, Lin, Sina, Pointing, Jessica, Hirth, Auguste, Ma, Henry, Palsberg, Jens, Aiken, Alex, Acar, Umut A, Jia, Zhihao

    Published 19-04-2022
    “…Existing quantum compilers optimize quantum circuits by applying circuit transformations designed by experts. This approach requires significant manual effort…”
    Get full text
    Journal Article
  20. 20

    Avrora: scalable sensor network simulation with precise timing by Titzer, B.L., Lee, D.K., Palsberg, J.

    “…Simulation can be an important step in the development of software for wireless sensor networks and has been the subject of intense research in the past…”
    Get full text
    Conference Proceeding