Sciweavers

1821 search results - page 208 / 365
» Security-Aware Program Transformations
Sort
View
VLDB
1998
ACM
141views Database» more  VLDB 1998»
14 years 1 months ago
Bulk-Loading Techniques for Object Databases and an Application to Relational Data
We present a framework for designing, in a declarative and flexible way, efficient migration programs and an undergoing implementation of a migration tool called RelOO whose targe...
Sihem Amer-Yahia, Sophie Cluet, Claude Delobel
PLDI
1997
ACM
14 years 1 months ago
Data-centric Multi-level Blocking
We present a simple and novel framework for generating blocked codes for high-performance machines with a memory hierarchy. Unlike traditional compiler techniques like tiling, whi...
Induprakas Kodukula, Nawaaz Ahmed, Keshav Pingali
ICPP
1993
IEEE
14 years 1 months ago
Automatic Parallelization Techniques for the EM-4
: This paper presents a Data-Distributed Execution approach that exploits interation-level parallelism in loops operating over arrays. It performs data-dependency analysis, based o...
Lubomir Bic, Mayez A. Al-Mouhamed
PLILP
1992
Springer
14 years 1 months ago
Strictness Analysis for Attribute Grammars
Attribute grammars may be seen as a (rather specialised) lazy or demand-driven programming language. The "programs" in this language take text or parse trees as input an...
Mads Rosendahl
SC
1990
ACM
14 years 1 months ago
Loop distribution with arbitrary control flow
Loop distribution is an integral part of transforming a sequential program into a parallel one. It is used extensively in parallelization,vectorization, and memory management. For...
Ken Kennedy, Kathryn S. McKinley