Sciweavers

890 search results - page 147 / 178
» Programming language methods in computer security
Sort
View
CORR
2011
Springer
221views Education» more  CORR 2011»
13 years 3 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
IPPS
2002
IEEE
14 years 1 months ago
Efficient Pipelining of Nested Loops: Unroll-and-Squash
The size and complexity of current custom VLSI have forced the use of high-level programming languages to describe hardware, and compiler and synthesis technology bstract designs ...
Darin Petkov, Randolph E. Harr, Saman P. Amarasing...
POPL
1995
ACM
14 years 1 days ago
Monad Transformers and Modular Interpreters
We show how a set of building blocks can be used to construct programming language interpreters, and present implementations of such building blocks capable of supporting many com...
Sheng Liang, Paul Hudak, Mark P. Jones
VL
2005
IEEE
113views Visual Languages» more  VL 2005»
14 years 2 months ago
Estimating the Numbers of End Users and End User Programmers
In 1995, Boehm predicted that by 2005, there would be “55 million performers” of “end user programming” in the United States. The original context and method which generat...
Christopher Scaffidi, Mary Shaw, Brad A. Myers
SPIN
2001
Springer
14 years 28 days ago
p2b: A Translation Utility for Linking Promela and Symbolic Model Checking (Tool Paper)
p2b is a research tool that translates Promela programs to boolean representations of the automata associated with them. These representations conform to the input syntax of the wi...
Michael Baldamus, Jochen Schröder-Babo