Sciweavers

1821 search results - page 120 / 365
» Security-Aware Program Transformations
Sort
View
SPE
2008
83views more  SPE 2008»
13 years 9 months ago
Conditioned semantic slicing for abstraction; industrial experiment
raction; Industrial Experiment Martin Ward, , Hussein Zedan
Martin P. Ward, Hussein Zedan, Matthias Ladkau, St...
PRL
2002
75views more  PRL 2002»
13 years 8 months ago
Robust evidence-based object tracking
We extend the velocity Hough transform (VHT) for tracking objects with arbitrary velocity by
Pelopidas Lappas, John N. Carter, Robert I. Damper
CADE
2009
Springer
14 years 9 months ago
A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs
Abstract. An approach based on term rewriting techniques for the automated termination analysis of imperative programs operating on integers is presented. An imperative program is ...
Stephan Falke, Deepak Kapur
AFP
2008
Springer
236views Formal Methods» more  AFP 2008»
14 years 3 months ago
A Tutorial on Parallel and Concurrent Programming in Haskell
This practical tutorial introduces the features available in Haskell for writing parallel and concurrent programs. We first describe how to write semi-explicit parallel programs b...
Simon L. Peyton Jones, Satnam Singh
ECOOP
1999
Springer
14 years 1 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii