Sciweavers

1821 search results - page 136 / 365
» Security-Aware Program Transformations
Sort
View
TOOLS
2009
IEEE
14 years 3 months ago
On Realizing a Framework for Self-tuning Mappings
Realizing information exchange is a frequently recurring challenge in nearly every domain of computer science. Although languages, formalisms, and storage formats may differ in va...
Manuel Wimmer, Martina Seidl, Petra Brosch, Horst ...
MPC
2004
Springer
116views Mathematics» more  MPC 2004»
14 years 2 months ago
An Injective Language for Reversible Computation
Abstract. Erasure of information incurs an increase in entropy and dissipates heat. Therefore, information-preserving computation is essential for constructing computers that use e...
Shin-Cheng Mu, Zhenjiang Hu, Masato Takeichi
ECOOP
2010
Springer
14 years 1 months ago
Automatically Extracting Class Diagrams from Spreadsheets
Abstract. The use of spreadsheets to capture information is widespread in industry. Spreadsheets can thus be a wealthy source of domain information. We propose to automatically ext...
Felienne Hermans, Martin Pinzger, Arie van Deursen
HOTOS
2009
IEEE
14 years 1 months ago
FLUXO: A Simple Service Compiler
In this paper, we propose FLUXO, a system that separates an Internet service's logical functionality from the architectural decisions made to support performance, scalability...
Emre Kiciman, V. Benjamin Livshits, Madanlal Musuv...
ALGORITHMICA
2010
164views more  ALGORITHMICA 2010»
13 years 9 months ago
Space Efficient Algorithms for the Burrows-Wheeler Backtransformation
The Burrows-Wheeler transformation is used for effective data compression, e.g., in the well known program bzip2. Compression and decompression are done in a block-wise fashion; la...
Ulrich Lauther, Tamás Lukovszki