Sciweavers

135 search results - page 6 / 27
» Clone Detection Using Abstract Syntax Trees
Sort
View
SCAM
2005
IEEE
14 years 1 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...
WCRE
2000
IEEE
13 years 11 months ago
E/R Schema for the Datrix C/C++/Java Exchange Format
A SEF (software exchange format), such as GXL [6], TA [4] or RSF [7], is used to exchange data between tools that analyze software. Researchers at Bell Canada have specified the D...
Richard C. Holt, Ahmed E. Hassan, Bruno Laguë...
GPCE
2005
Springer
14 years 29 days ago
Generalized Type-Based Disambiguation of Meta Programs with Concrete Object Syntax
Abstract. In meta programming with concrete object syntax, object-level programs are composed from fragments written in concrete syntax. The use of small program fragments in such ...
Martin Bravenboer, Rob Vermaas, Jurgen J. Vinju, E...
TOPLAS
2010
115views more  TOPLAS 2010»
13 years 5 months ago
JavaCOP: Declarative pluggable types for java
program constraints are defined over a program’s abstract syntax tree. The JAVACOP compiler automatically enforces these constraints on programs during compilation. The JAVACOP ...
Shane Markstrum, Daniel Marino, Matthew Esquivel, ...
DAGSTUHL
2006
13 years 8 months ago
Program Compression
Abstract. The talk focused on a grammar-based technique for identifying redundancy in program code and taking advantage of that redundancy to reduce the memory required to store an...
William S. Evans