Sciweavers

1821 search results - page 186 / 365
» Security-Aware Program Transformations
Sort
View
COMPASS
1994
14 years 1 months ago
Equations for Describing Dynamic Nets of Communicating Systems
We give a notation and a logical calculus for the description and deductive manipulation of dynamic networks of communicating components. We represent such nets by hierarchical sys...
Manfred Broy
CADE
1992
Springer
14 years 1 months ago
Implementing the Meta-Theory of Deductive Systems
Abstract. We exhibit a methodology for formulating and verifying metatheorems about deductive systems in the Elf language, an implementation of the LF Logical Framework with an ope...
Frank Pfenning, Ekkehard Rohwedder
PEPM
2000
ACM
14 years 25 days ago
From Recursion to Iteration: What are the Optimizations?
Transforming recursion into iteration eliminates the use of stack frames during program execution. It has been studied extensively. This paper describes a powerful and systematic ...
Yanhong A. Liu, Scott D. Stoller
EPK
2004
186views Management» more  EPK 2004»
13 years 10 months ago
EPML2SVG - Generating Websites from EPML Processes
: This paper presents an approach to map EPC business process models available in EPML to Scalable Vector Graphics (SVG) and websites. This mapping has been implemented as an XSLT ...
Jan Mendling, Alberto Brabenetz, Gustaf Neumann
ENTCS
2006
107views more  ENTCS 2006»
13 years 9 months ago
Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting
This paper presents a novel profiling approach, which is entirely based on program transformation techniques in order to enable exact profiling, preserving complete call stacks, m...
Walter Binder, Jarle Hulaas