Sciweavers

1821 search results - page 118 / 365
» Security-Aware Program Transformations
Sort
View
OOPSLA
2010
Springer
15 years 19 days ago
Ficticious: MicroLanguages for interactive fiction
In this paper we provide an experience report where language oriented programming approaches are applied to complex game design. Ficticious is a G-expression based pidgin of sever...
James Dean Palmer
131
Voted
FMCAD
2004
Springer
15 years 7 months ago
Proof Styles in Operational Semantics
Abstract. We relate two well-studied methodologies in deductive verification of operationally modeled sequential programs, namely the use of inductive invariants and clock functio...
Sandip Ray, J. Strother Moore
PPDP
2010
Springer
15 years 19 days ago
Graph queries through datalog optimizations
This paperdescribes the use of a powerful graph query language for querying programs, and a novel combination of transformations for generating efficient implementations of the q...
K. Tuncay Tekle, Michael Gorbovitski, Yanhong A. L...

Publication
308views
17 years 1 months ago
Measures for Classification and Detection in Steganalysis
Still and multi-media images are subject to transformations for compression, steganographic embedding and digital watermarking. In a major program of activities we are engaged in t...
Sujit Gujar, C E Veni Madhavan
LICS
1997
IEEE
15 years 6 months ago
Semantics of Exact Real Arithmetic
In this paper, we incorporate a representation of the non-negative extended real numbers based on the composition of linear fractional transformations with nonnegative integer coe...
Peter John Potts, Abbas Edalat, Martín H&ou...