Sciweavers

1821 search results - page 146 / 365
» Security-Aware Program Transformations
Sort
View
ICFP
2007
ACM
14 years 9 months ago
Stream fusion: from lists to streams to nothing at all
This paper presents an automatic deforestation system, stream fusion, based on equational transformations, that fuses a wider range of functions than existing short-cut fusion sys...
Duncan Coutts, Roman Leshchinskiy, Don Stewart
IWMM
2009
Springer
125views Hardware» more  IWMM 2009»
14 years 3 months ago
Precise garbage collection for C
Magpie is a source-to-source transformation for C programs that enables precise garbage collection, where precise means that integers are not confused with pointers, and the liven...
Jon Rafkind, Adam Wick, John Regehr, Matthew Flatt
ICTCS
2005
Springer
14 years 2 months ago
Error Mining for Regular Expression Patterns
In the design of type systems for XML programming languages based on regular expression types and patterns the focus has been over result analysis, with the main aim of statically ...
Giuseppe Castagna, Dario Colazzo, Alain Frisch
APLAS
2004
ACM
14 years 2 months ago
An Algebraic Approach to Bi-directional Updating
In many occasions would one encounter the task of maintaining the consistency of two pieces of structured data that are related by some transform — synchronising bookmarks in di...
Shin-Cheng Mu, Zhenjiang Hu, Masato Takeichi
IWPC
1997
IEEE
14 years 1 months ago
Using Knowledge Representation to Understand Interactive Systems
System migration presents a myriad of challenges in software maintenance. The user interfaces of interactive systems can undergo significant change during migration. Program unde...
Melody M. Moore, Spencer Rugaber