Sciweavers

1821 search results - page 125 / 365
» Security-Aware Program Transformations
Sort
View
ENTCS
2002
78views more  ENTCS 2002»
13 years 9 months ago
Slicing Synchronous Reactive Programs
This paper extends the well-known technique of slicing to synchronous reactive programs. Synchronous languages exemplified by Esterel, Lustre, Signal and Argos, novel model of exe...
Vinod Ganapathy, S. Ramesh
HASKELL
2005
ACM
14 years 2 months ago
There and back again: arrows for invertible programming
Invertible programming occurs in the area of data conversion where it is required that the conversion in one direction is the inverse of the other. For that purpose, we introduce ...
Artem Alimarine, Sjaak Smetsers, Arjen van Weelden...
CP
2005
Springer
14 years 2 months ago
Modeling Constraint Programs with Software Technology Standards
There is no unified modeling standard available to the CP community, so constraint programs can not be developed independently from the used CP library. Without such standard, CP ...
Matthias Hoche, Stefan Jähnichen
LOPSTR
2005
Springer
14 years 2 months ago
An Algorithm for Local Variable Elimination in Normal Logic Programs
A variable is local if it occurs in a clause body but not in its head. Local variables appear naturally in practical logic programming, but they complicate several aspects such as ...
Javier Álvez, Paqui Lucio
PEPM
2004
ACM
14 years 2 months ago
Imperative program optimization by partial evaluation
We implement strength reduction and loop-invariant code motion by specializing instrumented interpreters; we define a novel program transformation that uses bisimulation to ident...
Søren Debois