Sciweavers

2000 search results - page 21 / 400
» Program Transformation and Proof Transformation
Sort
View
POPL
2005
ACM
14 years 7 months ago
From sequential programs to multi-tier applications by program transformation
Modern applications are designed in multiple tiers to separate concerns. Since each tier may run at a separate location, middleware is required to mediate access between tiers. Ho...
Matthias Neubauer, Peter Thiemann
ENTCS
2006
151views more  ENTCS 2006»
13 years 7 months ago
Extending C for Checking Shape Safety
The project Safe Pointers by Graph Transformation at the University of York has developed a method for specifying the shape of pointer-data structures by graph reduction, and a st...
Mike Dodds, Detlef Plump
ESOP
2004
Springer
14 years 24 days ago
Static Analysis of Digital Filters
We present an Abstract Interpretation-based framework for automatically analyzing programs containing digital filters. Our framework allows refining existing analyses so that the...
Jérôme Feret
APSEC
2002
IEEE
14 years 11 days ago
An Automated Refactoring Approach to Design Pattern-Based Program Transformations in Java Programs
Software often needs to be modified for accommodating requirements changes through the software life cycle. To deal with several accidental requirements changes related to softwa...
Sang-Uk Jeon, Joon-Sang Lee, Doo-Hwan Bae
DRM
2007
Springer
14 years 1 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...