Sciweavers

1821 search results - page 14 / 365
» Security-Aware Program Transformations
Sort
View
STTT
2010
134views more  STTT 2010»
13 years 6 months ago
A case study to evaluate the suitability of graph transformation tools for program refactoring
This article proposes a case study to evaluate the suitability of graph transformation tools for program refactoring. In order to qualify for this purpose, a graph transformation s...
Francisco Javier Pérez, Yania Crespo, Berth...
ASIAN
1999
Springer
99views Algorithms» more  ASIAN 1999»
13 years 12 months ago
Beyond Tamaki-Sato Style Unfold/Fold Transformations for Normal Logic Programs
Unfold/fold transformation systems for logic programs have been extensively investigated. Existing unfold/fold transformation systems for normal logic programs allow only Tamaki-Sa...
Abhik Roychoudhury, K. Narayan Kumar, C. R. Ramakr...
MDAFA
2004
Springer
111views Hardware» more  MDAFA 2004»
14 years 29 days ago
Model Transformation Language MOLA
The paper describes a new graphical model transformation language MOLA. The basic idea of MOLA is to merge traditional structured programming as a control structure with pattern-ba...
Audris Kalnins, Janis Barzdins, Edgars Celms
POPL
1992
ACM
13 years 11 months ago
Unboxed Objects and Polymorphic Typing
This paper presents a program transformation that allows languages with polymorphic typing (e.g. ML) to be implemented with unboxed, multi-word data representations, more efficien...
Xavier Leroy