Sciweavers

1821 search results - page 202 / 365
» Security-Aware Program Transformations
Sort
View
CSL
1989
Springer
14 years 1 months ago
Algebraic Operational Semantics and Occam
We generalize algebraic operational semantics from sequential languages to distributed, concurrent languages using Occam as an example. Elsewhere, we will discuss applications to ...
Yuri Gurevich, Lawrence S. Moss
RTA
2010
Springer
14 years 22 days ago
Automated Termination Analysis of Java Bytecode by Term Rewriting
We present an automated approach to prove termination of Java Bytecode (JBC) programs by automatically transforming them to term rewrite systems (TRSs). In this way, the numerous t...
Carsten Otto, Marc Brockschmidt, Christian von Ess...
CIE
2008
Springer
13 years 11 months ago
Extraction in Coq: An Overview
The extraction mechanism of Coq allows one to transform Coq proofs and functions into functional programs. We illustrate the behavior of this tool by reviewing several variants of ...
Pierre Letouzey
FLOPS
2008
Springer
13 years 11 months ago
A Generalization of the Folding Rule for the Clark-Kunen Semantics
Abstract. In this paper, we propose more flexible applicability conditions for the folding rule that increase the power of existing unfold/fold systems for normal logic programs. O...
Javier Álvez, Paqui Lucio
ACL
1996
13 years 10 months ago
Magic for Filter Optimization in Dynamic Bottom-up Processing
Off-line compilation of logic grammars using Magic allows an incorporation of filtering into the logic underlying the grammar. The explicit definite clause characterization of fil...
Guido Minnen