Sciweavers

1821 search results - page 231 / 365
» Security-Aware Program Transformations
Sort
View
SAC
2008
ACM
13 years 9 months ago
Optimizing code through iterative specialization
Code specialization is a way to obtain significant improvement in the performance of an application. It works by exposing values of different parameters in source code. The availa...
Minhaj Ahmad Khan, Henri-Pierre Charles, Denis Bar...
ICMT
2009
Springer
14 years 4 months ago
A Simple Game-Theoretic Approach to Checkonly QVT Relations
Abstract. The QVT Relations (QVT-R) transformation language allows the definition of bidirectional model transformations, which are required in cases where a two (or more) models ...
Perdita Stevens
ICPR
2008
IEEE
14 years 11 months ago
New extensions of the 3-simplex for exterior orientation
Object pose may be determined from a set of 2D image points and corresponding 3D model points, given the camera's intrinsic parameters. In this paper, two new exterior orient...
John Martin Steinbis, Tyrone Vincent, William A. H...
ICCAD
2006
IEEE
96views Hardware» more  ICCAD 2006»
14 years 6 months ago
Loop pipelining for high-throughput stream computation using self-timed rings
We present a technique for increasing the throughput of stream processing architectures by removing the bottlenecks caused by loop structures. We implement loops as self-timed pip...
Gennette Gill, John Hansen, Montek Singh
ICSE
2009
IEEE-ACM
14 years 4 months ago
Semantics-based code search
Our goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user’s specifications. The key words here are spec...
Steven P. Reiss