*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 4*number_thousands_separator*694

1

WebAssembly: Yes, but for What?
Wingo, Andy
Communications of the ACM. Nov2025, Vol. 68 Issue 11, p50-54. 5p.

SOURCE code COMPILERS (Computer prog... BINARY codes APPLICATION program inte... ARTIFICIAL intelligence DATA security
*Periodical*
2

基于源代码迁移的编译器优化方法研究.
周 放 ; 刘茂福 ; 李珊枝
Computer Engineering & Science / Jisuanji Gongcheng yu Kexue. Oct2025, Vol. 47 Issue 10, p1890-1900. 11p.

DEEP learning COMPILERS (Computer prog... MATHEMATICAL optimizatio... PROGRAM transformation FLOWGRAPHS
*Academic Journal*
3

Automatically Translating C to Rust.
Hong, Jaemin ; Ryu, Sukyoung
Communications of the ACM; Nov2025, Vol. 68 Issue 11, p58-65, 8p

C (Computer program lang... PROGRAMMING languages COMPUTER programming LEGACY systems COMPILERS (Computer prog... LANGUAGE models
*Periodical*
4

Automatic Compiler Tuning for Inlining with Machine Learning.
Huang, Da ; Shi, Xiaohua ; Feng, Yuchen ; et al.
International Journal of Pattern Recognition & Artificial Intelligence. Sep2025, Vol. 39 Issue 11, p1-21. 21p.

MACHINE learning COMPILERS (Computer prog... BENCHMARK problems (Comp... OPTIMIZATION algorithms SIMULATED annealing ENSEMBLE learning
*Academic Journal*
5

A Comprehensive Approach to Rustc Optimization Vulnerability Detection in Industrial Control Systems.
Xie, Kaifeng ; Wan, Jinjing ; Chen, Lifeng ; et al.
Mathematics (2227-7390). Aug2025, Vol. 13 Issue 15, p2459. 20p.

INDUSTRIAL controls manu... COMPILERS (Computer prog... DYNAMIC testing QUALITY assurance LANGUAGE models RISK assessment
*Academic Journal*
6

A COMPILER APPROACH TO PHARMACOVIGILANCE.
Christopher, Mani Kitgwim ; Nyap, Davou Choji ; Blamah, Nachamada Vachaku ; et al.
Science World Journal. 2025, Vol. 20 Issue 3, p1308-1312. 5p.

COMPILERS (Computer prog... DRUG side effects ELECTRONIC data processi... MACHINE learning MEDICATION safety RANDOM forest algorithms
*Academic Journal*
7

Homomorphic Encryption for Confidential Statistical Computation: Feasibility and Challenges.
Kurt Peker, Yesem ; Raj, Rahul
Journal of Cybersecurity & Privacy; Feb2026, Vol. 6 Issue 1, p4, 23p

DATA encryption HOMOMORPHISMS COMPUTATIONAL statistics DATA privacy CRYPTOSYSTEMS COMPILERS (Computer prog...
*Academic Journal*
8

Multi-Level Parallel CPU Execution Method for Accelerated Portion-Based Variant Call Format Data Processing.
Mochurad, Lesia ; Tsmots, Ivan ; Mostova, Vita ; et al.
Computation; Feb2026, Vol. 14 Issue 2, p48, 20p

PARALLEL processing GENETIC mutation COMPUTER multitasking HIGH performance computi... COMPILERS (Computer prog... RESOURCE allocation
*Academic Journal*
9

Py++ (Python based C++ Approached Compiler with Win32 Editor and Debugger).
Phatangare, Sheetal ; Yadav, Ishaan ; Maheshwari, Yash ; et al.
Grenze International Journal of Engineering & Technology (GIJET); Jan2026, Vol. 12 Issue Part2, p2426-2430, 5p

COMPILERS (Computer prog... PARSING (Grammar) DATA structures SUBROUTINES (Computer pr... PROGRAMMING languages
*Academic Journal*
10

SLTP: A Symbolic Travel-Planning Agent Framework with Decoupled Translation and Heuristic Tree Search.
Tang, Debin ; Jiang, Qian ; Yang, Jingpu ; et al.
Electronics (2079-9292); Jan2026, Vol. 15 Issue 2, p422, 23p

TRAVEL planning LANGUAGE models MACHINE learning HEURISTIC COMPILERS (Computer prog... KNOWLEDGE transfer
*Academic Journal*
11

Type-Theory of Algorithms with Chain-Free Memory and Iterative Computations.
Loukanova, Roussanka
Journal of Applied Logics- IfCoLog Journal of Logics & their Applications (FLAP); Jan2026, Vol. 13 Issue 1, p155-173, 19p

ALGORITHMS RECURSION theory MATHEMATICAL simplificat... ITERATIVE methods (Mathe... PROGRAMMING languages COMPILERS (Computer prog...
*Academic Journal*
12

Assessment of Multicore Processor Soft Error Reliability Using BBRO‐DNN and SSF‐FIS Models.
Jadhav, Usha ; Malathi, P.
Concurrency & Computation: Practice & Experience; Jan2026, Vol. 38 Issue 1, p1-32, 32p

MULTICORE processors SOFT errors RELIABILITY in engineeri... COMPILERS (Computer prog... VIRTUAL machine systems FAILURE analysis
*Academic Journal*
13

Heuristics Analyses of Smart Contracts Bytecodes and Their Classifications.
Udokwu, Chibuzor ; Mirhosseini, Seyed Amid Moeinzadeh ; Craß, Stefan
Electronics (2079-9292); Jan2026, Vol. 15 Issue 1, p41, 19p

CLASSIFICATION RISK assessment COMPILERS (Computer prog... COMPUTER security vulner... BLOCKCHAINS
*Academic Journal*
14

Towards type-directed compiler calculation.
SWIERSTRA, WOUTER
Journal of Functional Programming. 2025, Vol. 35, p1-27. 27p.

LAMBDA calculus COMPILERS (Computer prog... EVALUATORS MACHINE theory PROGRAMMING languages
*Academic Journal*
15

Constraint-Efficient Comparators via Weighted Accumulation.
Guzmán-Albiol, Marc ; Bellés-Muñoz, Marta ; Genés-Durán, Rafael ; et al.
Mathematics (2227-7390); Dec2025, Vol. 13 Issue 24, p3959, 25p

COMPARATOR circuits BINARY number system CONSTRAINT satisfaction ALGORITHMS COMPILERS (Computer prog... CONSTRAINT programming
*Academic Journal*
16

Survey of techniques to detect common weaknesses in program binaries.
Adhikari, Ashish ; Kulkarni, Prasad
Cyber Security & Applications; Dec2025, Vol. 3, p1-14, 14p

COMPUTER security vulner... COMPILERS (Computer prog... PENETRATION testing (Com... OPEN source software
*Academic Journal*
17

Legacy Code, Live Risk: Empirical Evidence of Malware Detection Gaps.
Huang, Gang-Cheng ; Lai, Tai-Hung
Applied Sciences (2076-3417); Nov2025, Vol. 15 Issue 22, p11862, 18p

MALWARE PROGRAMMING languages LEGACY systems COMPILERS (Computer prog... MALWARE prevention INTERNET security
*Academic Journal*
18

Register‐Based and Stack‐Based Virtual Machines: Which Perform Better in JIT Compilation Scenarios?
Šimek, Bohuslav ; Fiala, Dalibor ; Dostal, Martin
Software: Practice & Experience; Nov2025, Vol. 55 Issue 11, p1896-1910, 15p

VIRTUAL machine systems COMPUTER performance BENCHMARK problems (Comp... COMPUTER architecture COMPILERS (Computer prog...
*Academic Journal*
19

Bounded verification for finite-field-blasting in a compiler for zero knowledge proofs.
Ozdemir, Alex ; Wahby, Riad S. ; Brown, Fraser ; et al.
Formal Methods in System Design; Nov2025, Vol. 67 Issue 2, p161-188, 28p

FINITE fields COMPILERS (Computer prog... SOFTWARE validation ENCRYPTION protocols
*Academic Journal*
20

Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities.
Cuéllar Gempeler, Santiago ; Harris, Bill ; Parker, James ; et al.
ACM Transactions on Privacy & Security; Nov2025, Vol. 28 Issue 4, p1-35, 35p

COMPUTER security vulner... CRYPTOGRAPHY COMPILERS (Computer prog... RISK assessment APPLIED sciences DISCLOSURE
*Academic Journal*

*Filter*