Sciweavers

1821 search results - page 130 / 365
» Security-Aware Program Transformations
Sort
View
LOPSTR
2004
Springer
14 years 2 months ago
Graph-Based Proof Counting and Enumeration with Applications for Program Fragment Synthesis
For use in earlier approaches to automated module interface adaptation, we seek a restricted form of program synthesis. Given some typing assumptions and a desired result type, we ...
J. B. Wells, Boris Yakobowski
PPDP
2004
Springer
14 years 2 months ago
A semantics for tracing declarative multi-paradigm programs
We introduce the theoretical basis for tracing lazy functional logic computations in a declarative multi-paradigm language like Curry. Tracing computations is a difficult task due...
Bernd Brassel, Michael Hanus, Frank Huch, Germ&aac...
PLILP
1998
Springer
14 years 1 months ago
A Compiler for Rewrite Programs in Associative-Commutative Theories
Abstract. We address the problem of term normalisation modulo associativecommutative (AC) theories, and describe several techniques for compiling many-to-one AC matching and reduce...
Pierre-Etienne Moreau, Hélène Kirchn...
ICCAD
1995
IEEE
95views Hardware» more  ICCAD 1995»
14 years 20 days ago
A sequential quadratic programming approach to concurrent gate and wire sizing
With an ever-increasing portion of the delay in highspeed CMOS chips attributable to the interconnect, interconnect-circuit design automation continues to grow in importance. By t...
Noel Menezes, Ross Baldick, Lawrence T. Pileggi
IASTEDSEA
2004
13 years 10 months ago
XML-based programming language modeling: An approach to software engineering
Today's software faces escalating technical and business difficulties, yet it continues to be coded in static, inflexible structures that are not prepared for automation and ...
Christian Reichel, Roy Oberhauser