Sciweavers

1821 search results - page 145 / 365
» Security-Aware Program Transformations
Sort
View
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
14 years 3 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
ICFP
2005
ACM
14 years 2 months ago
Fast narrowing-driven partial evaluation for inductively sequential programs
Narrowing-driven partial evaluation is a powerful technique for the specialization of (first-order) functional and functional logic programs. However, although it gives good resu...
J. Guadalupe Ramos, Josep Silva, Germán Vid...
RR
2010
Springer
13 years 7 months ago
Defeasibility in Answer Set Programs via Argumentation Theories
Defeasible reasoning has been studied extensively in the last two decades and many different and dissimilar approaches are currently on the table. This multitude of ideas has made...
Hui Wan, Michael Kifer, Benjamin N. Grosof
CORR
2011
Springer
150views Education» more  CORR 2011»
13 years 4 months ago
Program Optimization Based Pointer Analysis and Live Stack-Heap Analysis
In this paper, we present type systems for flow-sensitive pointer analysis, live stack-heap (variables) analysis, and program optimization. The type system for live stack-heap ana...
Mohamed A. El-Zawawy
ICSE
2007
IEEE-ACM
14 years 9 months ago
Feature Oriented Model Driven Development: A Case Study for Portlets
Model Driven Development (MDD) is an emerging paradigm for software construction that uses models to specify programs, and model transformations to synthesize executables. Feature...
Don S. Batory, Oscar Díaz, Salvador Trujill...