Alexander Jordan
Alexander Jordan
Oracle Labs
Verified email at - Homepage
TitleCited byYear
T-CREST: Time-predictable multi-core architecture for embedded systems
M Schoeberl, S Abbaspour, B Akesson, N Audsley, R Capasso, J Garside, ...
Journal of Systems Architecture 61 (9), 449-471, 2015
Static analysis of worst-case stack cache behavior
A Jordan, F Brandner, M Schoeberl
Proceedings of the 21st International conference on Real-Time Networks and …, 2013
Static profiling of the worst-case in real-time programs
F Brandner, S Hepp, A Jordan
Proceedings of the 20th International Conference on Real-Time and Network …, 2012
Combining string abstract domains for JavaScript analysis: an evaluation
R Amadini, A Jordan, G Gange, F Gauthier, P Schachte, H Søndergaard, ...
International Conference on Tools and Algorithms for the Construction and …, 2017
Lazy spilling for a time-predictable stack cache: Implementation and analysis
S Abbaspour, A Jordan, F Brandner
14th International Workshop on Worst-Case Execution Time Analysis, 83-92, 2014
Criticality: static profiling for real-time programs
F Brandner, S Hepp, A Jordan
Real-Time Systems 50 (3), 377-410, 2014
IR-level versus machine-level if-conversion for predicated architectures
A Jordan, N Kim, A Krall
Proceedings of the 10th Workshop on Optimizations for DSP and Embedded …, 2013
Reference Abstract Domains and Applications to String Analysis
R Amadini, G Gange, F Gauthier, A Jordan, P Schachte, H Søndergaard, ...
Fundamenta Informaticae 158 (4), 297-326, 2018
Refinement of worst-case execution time bounds by graph pruning
F Brandner, A Jordan
Computer Languages, Systems & Structures 40 (3-4), 155-170, 2014
Subgraph-Based Refinement of Worst-Case Execution Time Bounds
F Brandner, A Jordan
Evaluating and estimating the WCET criticality metric
A Jordan
Proceedings of the 11th Workshop on Optimizations for DSP and Embedded …, 2014
A FFOGATO: runtime detection of injection attacks for Node. js
F Gauthier, B Hassanshahi, A Jordan
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 94-99, 2018
Automatic Modeling of Opaque Code for JavaScript Static Analysis
J Park, A Jordan, S Ryu
International Conference on Fundamental Approaches to Software Engineering …, 2019
Detecting malicious code embedded in documents
AW Jordan, F Gauthier
US Patent App. 15/824,881, 2018
SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation
A Jordan, F Gauthier, B Hassanshahi, D Zhao
arXiv preprint arXiv:1810.12490, 2018
A Software Managed Stack Cache for Real-Time Systems
A Jordan, S Abbaspour, M Schoeberl
Proceedings of the 24th International Conference on Real-Time Networks and …, 2016
TACLe STSM: Refined WCET analysis for a stack-based data cache
A Jordan
14th International Workshop on Worst-Case Execution Time Analysis
B Lisper, A Maroneze, S Blazy, D Pichardie, I Puaut, L Santinelli, J Morio, ...
Schloss Dagstuhl-Leibniz-Zentrum für Informatik GmbH, 2014
Graph-based Cluster Assignment for VLIW Architectures
A Jordan
Optimal and Heuristic Code Generation for Explicitly Parallel Processors
G Barany, A Jordan, V Pavlu, A Krall
The system can't perform the operation now. Try again later.
Articles 1–20