Sciweavers

215 search results - page 27 / 43
» Concatenative Programming - An Overlooked Paradigm in Functi...
Sort
View
ACMSE
2004
ACM
14 years 10 days ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
VL
2009
IEEE
150views Visual Languages» more  VL 2009»
14 years 3 months ago
Discovery-based edit assistance for spreadsheets
Spreadsheets can be viewed as a highly flexible endusers programming environment which enjoys wide-spread adoption. But spreadsheets lack many of the structured programming conce...
Jácome Cunha, João Saraiva, Joost Vi...
VL
2007
IEEE
112views Visual Languages» more  VL 2007»
14 years 2 months ago
Visual Languages: A Matter of Style
This articles submits the thesis that visual data modeling and programming languages are conveniently conceived as rendering, or ‘styling’, of conventional, textual languages....
Sacha Berger, François Bry, Tim Furche, Chr...
AOSD
2007
ACM
14 years 18 days ago
Highly configurable transaction management for embedded systems
Embedded systems are an important field of research and will gain momentum in the near future. Many of these systems require data management functionality. Due to the resource con...
Mario Pukall, Thomas Leich, Martin Kuhlemann, Mark...
ESOP
2008
Springer
13 years 10 months ago
Verification of Higher-Order Computation: A Game-Semantic Approach
Abstract. We survey recent developments in an approach to the verification of higher-order computation based on game semantics. Higherorder recursion schemes are in essence (progra...
C.-H. Luke Ong