Sciweavers

1821 search results - page 198 / 365
» Security-Aware Program Transformations
Sort
View
PODS
2005
ACM
99views Database» more  PODS 2005»
14 years 9 months ago
XML type checking with macro tree transducers
MSO logic on unranked trees has been identified as a convenient theoretical framework for reasoning about expressiveness and implementations of practical XML query languages. As a...
Sebastian Maneth, Alexandru Berlea, Thomas Perst, ...
ACMMSP
2006
ACM
250views Hardware» more  ACMMSP 2006»
14 years 3 months ago
What do high-level memory models mean for transactions?
Many people have proposed adding transactions, or atomic blocks, to type-safe high-level programming languages. However, researchers have not considered the semantics of transacti...
Dan Grossman, Jeremy Manson, William Pugh
DOCENG
2003
ACM
14 years 2 months ago
XPath on left and right sides of rules: toward compact XML tree rewriting through node patterns
XPath [3, 5] is a powerful and quite successful language able to perform complex node selection in trees through compact specifications. As such, it plays a growing role in many ...
Jean-Yves Vion-Dury
ISSS
2002
IEEE
139views Hardware» more  ISSS 2002»
14 years 2 months ago
Multiprocessor Mapping of Process Networks: A JPEG Decoding Case Study
We present a system-level design and programming method for embedded multiprocessor systems. The aim of the method is to improve the design time and design quality by providing a ...
Erwin A. de Kock
CCGRID
2001
IEEE
14 years 29 days ago
KelpIO: A Telescope-Ready Domain-Specific I/O Library for Irregular Block-Structured Applications
To ameliorate the need to spend significant programmer time modifying parallel programs to achieve highperformance, while maintaining compact, comprehensible source codes, this pa...
Bradley Broom, Robert J. Fowler, Ken Kennedy