13 resultados coincidentes

Intel® Intrinsics Guide

Autor admin Última actualización 30/07/2013 - 09:19

Introduction to Intel® Memory Protection Extensions

The C and C++ languages provide for memory access via pointers, however, these languages do not ensure the safe use of pointers.

Autor RB (Intel) Última actualización 12/12/2014 - 11:18

Linux* ABI

by Milind Girkar, Hongjiu Lu, David Kreitzer, and Vyacheslav Zakharin (Intel)

Autor Milind Girkar (Intel) Última actualización 23/07/2013 - 10:09

Using Intel® MPX with the Intel® Software Development Emulator

Intel has announced a new technology called Intel® Memory Protection Extensions (Intel® MPX).

Autor Ady Tal (Intel) Última actualización 17/09/2013 - 06:30
Blog post

Intel® Memory Protection Extensions (Intel® MPX) Runtime Support

Enabling an application to use Intel MPX will generally not require source code updates but there is some runtime code needed in order to make use of Intel MPX.  For most applications this runtime

Autor Brian Vajda (Intel) Última actualización 23/07/2013 - 16:46

Using Intel® SDE's chip-check feature

Intel® SDE includes a software validation mechanism to restrict executed instructions to a part

Autor Mark Charney (Intel) Última actualización 11/10/2013 - 09:53

Pointer Checker in ICC: requires dynamic linking of runtime libraries

The -check-pointers switch, which enables the Pointer Checker feature, cannot be used with the -static flag on Linux* (/MT on Windows*) which forces all Intel libraries to be linked staticall

Autor Kittur Ganesh (Intel) Última actualización 11/07/2014 - 12:47

Intel® Memory Protection Extensions Enabling Guide

Abstract: This document describes Intel® Memory Protection Extensions (Intel® MPX), its motivation, and programming model.

Autor Sundaram Ramakesavan (Intel) Última actualización 16/04/2015 - 13:12
Para obtener información más completa sobre las optimizaciones del compilador, consulte nuestro Aviso de optimización.