Sciweavers

1821 search results - page 16 / 365
» Security-Aware Program Transformations
Sort
View
SLP
1994
118views more  SLP 1994»
13 years 10 months ago
A Simple Program Transformation for Parallelism
Most of the research, to date, on optimizing program transformations for declarative languages has focused on sequential execution strategies. In this paper, we consider a class o...
Saumya K. Debray, Mudita Jain
ASPLOS
2006
ACM
14 years 2 months ago
A program transformation and architecture support for quantum uncomputation
  Quantum  computing’s  power  comes  from  new  algorithms  that exploit quantum mechanical phenomena for computation. Quantum algorithms  are  different  from...
Ethan Schuchman, T. N. Vijaykumar
ERSHOV
2006
Springer
14 years 14 days ago
Program Generation in the Equivalent Transformation Computation Model Using the Squeeze Method
In the equivalent transformation (ET) computation model, a specification provides background knowledge in a problem domain, a program is a set of prioritized rewriting rules, and c...
Kiyoshi Akama, Ekawit Nantajeewarawat, Hidekatsu K...
ECOOP
2008
Springer
13 years 10 months ago
On Validity of Program Transformations in the Java Memory Model
Abstract. We analyse the validity of several common program transformations in multi-threaded Java, as defined by the Java Memory Model (JMM) section of Chapter 17 of the Java Lang...
Jaroslav Sevcík, David Aspinall
TOOLS
2008
IEEE
14 years 3 months ago
Guarded Program Transformations Using JTL
There is a growing research interest in employing the logic paradigm for making queries on software in general, and OOP software in particular. We describes a side-effect-free tech...
Tal Cohen, Joseph Gil, Itay Maman