Sciweavers

1821 search results - page 11 / 365
» Security-Aware Program Transformations
Sort
View
AGP
2003
IEEE
14 years 27 days ago
Transforming co-NP Checks to Answer Set Computation by Meta-Interpretation
Many NP-complete problems can be encoded in the answer set semantics of logic programs in a very concise way, where the encoding reflects the typical “guess and check” nature ...
Thomas Eiter, Axel Polleres
APCCM
2007
13 years 9 months ago
Merging Dynamic Functionality: Integration of XML Transformations
Integration of XML data is an increasingly important problem and many methods have recently been developed. In this talk, we examine the related and more challenging task of how t...
James Bailey, Ce Dong
SAS
1994
Springer
13 years 11 months ago
Generating Transformers for Deforestation and Supercompilation
Abstract. Our aim is to study how the interpretive approach -- inserting an interpreter between a source program and a program specializer -- can be used to improve the transformat...
Robert Glück, Jesper Jørgensen
PLDI
2012
ACM
11 years 10 months ago
Chimera: hybrid program analysis for determinism
Chimera1 uses a new hybrid program analysis to provide deterministic replay for commodity multiprocessor systems. Chimera leverages the insight that it is easy to provide determin...
Dongyoon Lee, Peter M. Chen, Jason Flinn, Satish N...
ICMT
2009
Springer
14 years 2 months ago
A Collection Operator for Graph Transformation
Abstract. Graph transformation has a well-established theory and associated tools that can be used to perform model transformations. However, the lack of a construct to match and t...
Roy Grønmo, Stein Krogdahl, Birger Mø...