13 resultados coincidentes
Article

Intel® Intrinsics Guide

Overview
Autor admin Última actualización 30/07/2013 - 09:19
Article

Introduction to Intel® Memory Protection Extensions

The C and C++ languages provide for memory access via pointers, however, these languages do not ensure the safe use of pointers.

Autor RB (Intel) Última actualización 12/12/2014 - 11:18
Article

Linux* ABI

by Milind Girkar, Hongjiu Lu, David Kreitzer, and Vyacheslav Zakharin (Intel)

Autor Milind Girkar (Intel) Última actualización 23/07/2013 - 10:09
Article

Using Intel® MPX with the Intel® Software Development Emulator

Intel has announced a new technology called Intel® Memory Protection Extensions (Intel® MPX).

Autor Ady Tal (Intel) Última actualización 17/09/2013 - 06:30
Blog post

Intel® Memory Protection Extensions (Intel® MPX) Runtime Support

Enabling an application to use Intel MPX will generally not require source code updates but there is some runtime code needed in order to make use of Intel MPX.  For most applications this runtime

Autor Brian Vajda (Intel) Última actualización 23/07/2013 - 16:46
Article

Using Intel® SDE's chip-check feature

Intel® SDE includes a software validation mechanism to restrict executed instructions to a part

Autor Mark Charney (Intel) Última actualización 11/10/2013 - 09:53
Article

Pointer Checker in ICC: requires dynamic linking of runtime libraries

The -check-pointers switch, which enables the Pointer Checker feature, cannot be used with the -static flag on Linux* (/MT on Windows*) which forces all Intel libraries to be linked staticall

Autor Kittur Ganesh (Intel) Última actualización 11/07/2014 - 12:47
Article

Intel® Memory Protection Extensions Enabling Guide

Abstract: This document describes Intel® Memory Protection Extensions (Intel® MPX), its motivation, and programming model.

Autor Sundaram Ramakesavan (Intel) Última actualización 16/04/2015 - 13:12
Para obtener información más completa sobre las optimizaciones del compilador, consulte nuestro Aviso de optimización.