Sciweavers

1821 search results - page 105 / 365
» Security-Aware Program Transformations
Sort
View
CIBSE
2009
ACM
14 years 3 months ago
A two-level formal semantics for the QVT language
Model Driven Engineering (MDE) proposes a software development process in which software is built by constructing one or more models, and transforming these into other models. In t...
Roxana S. Giandini, Claudia Pons, Gabriela P&eacut...
SCAM
2007
IEEE
14 years 3 months ago
Toward an Implementation of the "Form Template Method" Refactoring
This paper presents an implementation of the “form template method” refactoring. This transformation has not been automated yet, but has many similarities with other transform...
Nicolas Juillerat, Béat Hirsbrunner
LISP
2008
104views more  LISP 2008»
13 years 9 months ago
Flattening tuples in an SSA intermediate representation
For functional programs, unboxing aggregate data structures such as tuples removes memory indirections and frees dead components of the decoupled structures. To explore the consequ...
Lukasz Ziarek, Stephen Weeks, Suresh Jagannathan
IPPS
2007
IEEE
14 years 3 months ago
Optimizing Inter-Nest Data Locality Using Loop Splitting and Reordering
With the increasing gap between processor speed and memory latency, the performance of data-dominated programs are becoming more reliant on fast data access, which can be improved...
Sofiane Naci
CC
2012
Springer
243views System Software» more  CC 2012»
12 years 4 months ago
Sambamba: A Runtime System for Online Adaptive Parallelization
Abstract. How can we exploit a microprocessor as efficiently as possible? The “classic” approach is static optimization at compile-time, optimizing a program for all possible u...
Kevin Streit, Clemens Hammacher, Andreas Zeller, S...