Search Results - "Palsberg, Jens"
-
1
Optimal implementation of quantum gates with two controls
Published in Linear algebra and its applications (01-08-2024)“…We give a detailed proof of a well-known theorem in quantum computing. The theorem characterizes the number of two-qubit gates that is necessary for…”
Get full text
Journal Article -
2
Fast and Precise Application Code Analysis using a Partial Library
Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01-05-2022)“…Long analysis times are a key bottleneck for the widespread adoption of whole-program static analysis tools. Fortunately, however, a user is often only…”
Get full text
Conference Proceeding -
3
Low-Overhead Deadlock Prediction
Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01-10-2020)“…Multithreaded programs can have deadlocks, even after deployment, so users may want to run deadlock tools on deployed programs. However, current deadlock…”
Get full text
Conference Proceeding -
4
Striking a Balance: Pruning False-Positives from Static Call Graphs
Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01-05-2022)“…Researchers have reported that static analysis tools rarely achieve a false-positive rate that would make them attractive to developers. We overcome this…”
Get full text
Conference Proceeding -
5
Building a Quantum Engineering Undergraduate Program
Published in IEEE transactions on education (01-05-2022)“…Contribution: A roadmap is provided for building a quantum engineering education program to satisfy U.S. national and international workforce needs…”
Get full text
Journal Article -
6
Improving the effectiveness of system verification: Guest editors’ introduction to special section
Published in International journal on software tools for technology transfer (01-03-2008)“…This special section presents three extended and revised papers which originally appeared in the proceedings of the 12th edition of the conference “Tools and…”
Get full text
Journal Article -
7
Introduction to special issue on embedded systems architecture and applications
Published in Journal of systems architecture (01-05-2014)Get full text
Journal Article -
8
MEMOCODE 2006 guest editors’ introduction
Published in Design automation for embedded systems (01-06-2008)Get full text
Journal Article -
9
Aliased register allocation for straight-line programs is NP-complete
Published in Theoretical computer science (06-11-2008)“…Register allocation is NP-complete in general but can be solved in linear time for straight-line programs where each variable has at most one definition point…”
Get full text
Journal Article -
10
Deadline analysis of interrupt-driven software
Published in IEEE transactions on software engineering (01-10-2004)“…Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical…”
Get full text
Journal Article -
11
Static checking of interrupt-driven software
Published in Proceedings / International Conference on Software Engineering (2001)“…Resource-constrained devices are becoming ubiquitous. Examples include cell phones, Palm Pilots and digital thermostats. It can be difficult to fit the…”
Get full text
Conference Proceeding Journal Article -
12
Agnostic Protocol Translation for Cross-Domain Information Sharing
Published in MILCOM 2013 - 2013 IEEE Military Communications Conference (01-11-2013)“…Network translation gateways can provide seamless interoperability among different airborne, ground and maritime domains. Effective interconnection between…”
Get full text
Conference Proceeding -
13
Quanto: Optimizing Quantum Circuits with Automatic Generation of Circuit Identities
Published 22-11-2021“…Existing quantum compilers focus on mapping a logical quantum circuit to a quantum device and its native quantum gates. Only simple circuit identities are used…”
Get full text
Journal Article -
14
Testing versus Static Analysis of Maximum Stack Size
Published in 2013 IEEE 37th Annual Computer Software and Applications Conference (01-07-2013)“…For event-driven software on resource-constrained devices, estimates of the maximum stack size can be of paramount importance. For example, a poor estimate led…”
Get full text
Conference Proceeding -
15
Type inference for record concatenation and subtyping
Published in Information and computation (25-02-2004)“…Record concatenation, multiple inheritance, and multiple-object cloning are closely related and part of various language designs. For example, in Cardelli’s…”
Get full text
Journal Article -
16
Complexity results for 1-safe nets
Published in Theoretical computer science (07-08-1995)“…We study the complexity of several standard problems for 1-safe Petri nets and some of its subclasses. We prove that reachability, liveness, and deadlock are…”
Get full text
Journal Article -
17
Efficient Inference of Object Types: Volume123,Number 2 (1995), pages 198–209
Published in Information and computation (10-04-1996)Get full text
Journal Article -
18
Type-safe method inlining
Published in Science of computer programming (01-08-2004)“…In a typed language such as Java, inlining of virtual methods does not always preserve typability. The best known solution to this problem is to insert type…”
Get full text
Journal Article -
19
Quartz: Superoptimization of Quantum Circuits (Extended Version)
Published 19-04-2022“…Existing quantum compilers optimize quantum circuits by applying circuit transformations designed by experts. This approach requires significant manual effort…”
Get full text
Journal Article -
20
Avrora: scalable sensor network simulation with precise timing
Published in IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005 (2005)“…Simulation can be an important step in the development of software for wireless sensor networks and has been the subject of intense research in the past…”
Get full text
Conference Proceeding