Sciweavers

890 search results - page 106 / 178
» Programming language methods in computer security
Sort
View
TOOLS
2010
IEEE
13 years 7 months ago
Visualizing Dynamic Metrics with Profiling Blueprints
While traditional approaches to code profiling help locate performance bottlenecks, they offer only limited support for removing these bottlenecks. The main reason is the lack of v...
Alexandre Bergel, Romain Robbes, Walter Binder
GECCO
2004
Springer
140views Optimization» more  GECCO 2004»
14 years 3 months ago
Keeping the Diversity with Small Populations Using Logic-Based Genetic Programming
We present a new method of Logic-Based Genetic Programming (LBGP). Using the intrinsic mechanism of backtracking in Prolog, we utilize large individual programs with redundant clau...
Ken Taniguchi, Takao Terano
POPL
1998
ACM
14 years 2 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
IFL
2004
Springer
122views Formal Methods» more  IFL 2004»
14 years 3 months ago
Source-Based Trace Exploration
Abstract. Tracing a computation is a key method for program comprehension and debugging. Hat is a tracing system for Haskell 98 programs. During a computation a trace is recorded i...
Olaf Chitil
SAIG
2000
Springer
14 years 1 months ago
Generating Data Analysis Programs from Statistical Models
Extracting information from data, often also called data analysis, is an important scienti c task. Statistical approaches, which use methods from probability theory and numerical a...
Bernd Fischer 0002, Johann Schumann, Thomas Pressb...