Login / Signup
How to shadow every byte of memory used by a program.
Nicholas Nethercote
Julian Seward
Published in:
VEE (2007)
Keyphrases
</>
program execution
computational complexity
test cases
memory requirements
computing power
multiscale
memory size
limited memory
memory usage
fixed length
multi threaded
memory space
random access
real time
computer programs
data structure
neural network