Sciweavers

1821 search results - page 145 / 365
» Security-Aware Program Transformations
Sort
View
133
Voted
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
15 years 8 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
117
Voted
ICFP
2005
ACM
15 years 7 months ago
Fast narrowing-driven partial evaluation for inductively sequential programs
Narrowing-driven partial evaluation is a powerful technique for the specialization of (first-order) functional and functional logic programs. However, although it gives good resu...
J. Guadalupe Ramos, Josep Silva, Germán Vid...
129
Voted
RR
2010
Springer
15 years 18 days ago
Defeasibility in Answer Set Programs via Argumentation Theories
Defeasible reasoning has been studied extensively in the last two decades and many different and dissimilar approaches are currently on the table. This multitude of ideas has made...
Hui Wan, Michael Kifer, Benjamin N. Grosof
145
Voted
CORR
2011
Springer
150views Education» more  CORR 2011»
14 years 9 months ago
Program Optimization Based Pointer Analysis and Live Stack-Heap Analysis
In this paper, we present type systems for flow-sensitive pointer analysis, live stack-heap (variables) analysis, and program optimization. The type system for live stack-heap ana...
Mohamed A. El-Zawawy
111
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Feature Oriented Model Driven Development: A Case Study for Portlets
Model Driven Development (MDD) is an emerging paradigm for software construction that uses models to specify programs, and model transformations to synthesize executables. Feature...
Don S. Batory, Oscar Díaz, Salvador Trujill...