Sciweavers

1821 search results - page 197 / 365
» Security-Aware Program Transformations
Sort
View
CAIP
1995
Springer
155views Image Analysis» more  CAIP 1995»
14 years 26 days ago
A Proposal for the Implementation of a Parallel Watershed Algorithm
In this paper a parallel implementation of a watershed algorithm is proposed. The algorithm is designed for a ring-architecture with distributed memory and a piece of shared memory...
Arnold Meijster, Jos B. T. M. Roerdink
ECEASST
2006
92views more  ECEASST 2006»
13 years 9 months ago
An MDA Framework Supporting OCL
We present an mda framework, developed in the functional programming language sml, that tries to bridge the gap between formal software development and the needs of industrial soft...
Achim D. Brucker, Jürgen Doser, Burkhart Wolf...
CC
2009
Springer
153views System Software» more  CC 2009»
13 years 7 months ago
From Specification to Optimisation: An Architecture for Optimisation of Java Bytecode
We present the architecture of the Rosser toolkit that allows optimisations to be specified in a domain specific language, then compiled and deployed towards optimising object prog...
Richard Warburton, Sara Kalvala
ENTCS
2010
133views more  ENTCS 2010»
13 years 4 months ago
Inference of Session Types From Control Flow
This is a study of a technique for deriving the session type of a program written in a statically typed imperative language from its control flow. We impose on our unlabelled sess...
Peter Collingbourne, Paul H. J. Kelly
PLDI
2003
ACM
14 years 2 months ago
A comparison of empirical and model-driven optimization
Empirical program optimizers estimate the values of key optimization parameters by generating different program versions and running them on the actual hardware to determine which...
Kamen Yotov, Xiaoming Li, Gang Ren, Michael Cibuls...