Sciweavers

1821 search results - page 119 / 365
» Security-Aware Program Transformations
Sort
View
VLSID
1994
IEEE
151views VLSI» more  VLSID 1994»
14 years 1 months ago
A CORDIC Based Programmable DXT Processor Array
A CORDIC based processor array which can be programmed by switch settings to compute the Discrete Hariley, Cosine or Sine lhnsforms or their inverses is described. Through a novel...
V. K. Anuradha, V. Visvanathan
FMOODS
2003
13 years 10 months ago
Towards Object-Oriented Graphs and Grammars
This work aims to extend the algebraical approach to graph transformation to model object-oriented systems structures and computations. A graph grammar based formal framework for o...
Ana Paula Lüdtke Ferreira, Leila Ribeiro
SAC
2006
ACM
14 years 3 months ago
On the architectural alignment of ATL and QVT
Transforming models is a critical activity in Model Driven Engineering (MDE). With the expected adoption of the OMG QVT standard for model transformation language it is anticipate...
Frédéric Jouault, Ivan Kurtev
WWW
2005
ACM
14 years 2 months ago
Incremental maintenance for materialized XPath/XSLT views
This paper proposes an incremental maintenance algorithm that efficiently updates the materialized XPath/XSLT views defined using XPath expressions in XP{[],∗,//,vars} . The al...
Makoto Onizuka, Fong Yee Chan, Ryusuke Michigami, ...
IFL
1997
Springer
153views Formal Methods» more  IFL 1997»
14 years 1 months ago
Common Subexpressions Are Uncommon in Lazy Functional Languages
Common subexpression elimination is a well-known compiler optimisation that saves time by avoiding the repetition of the same computation. In lazy functional languages, referential...
Olaf Chitil