Sciweavers

1821 search results - page 25 / 365
» Security-Aware Program Transformations
Sort
View
SCAM
2008
IEEE
14 years 3 months ago
Using Program Transformations to Add Structure to a Legacy Data Model
An appropriate translation of the data model is central to any language migration effort. Finding a mapping between original and target data models may be challenging for legacy l...
Mariano Ceccato, Thomas Roy Dean, Paolo Tonella
SC
1995
ACM
14 years 10 days ago
Index Array Flattening Through Program Transformation
This paper presents techniques for compiling loops with complex, indirect array accesses into loops whose array references have at most one level of indirection. The transformatio...
Raja Das, Paul Havlak, Joel H. Saltz, Ken Kennedy
IFL
2004
Springer
131views Formal Methods» more  IFL 2004»
14 years 2 months ago
Exploiting Single-Assignment Properties to Optimize Message-Passing Programs by Code Transformations
The message-passing paradigm is now widely accepted and used mainly for inter-process communication in distributed memory parallel systems. However, one of its disadvantages is the...
Alfredo Cristóbal-Salas, Andrey Chernykh, E...
JOT
2010
76views more  JOT 2010»
13 years 7 months ago
A Program Transformation Technique to Support AOP within C++ Template
Aspect-oriented programming (AOP) provides assistance in modularizing concerns that crosscut the boundaries of system decomposition. Aspects have the potential to interact with ma...
Suman Roychoudhury, Jeff Gray, Jing Zhang, Purusho...
JLP
2000
109views more  JLP 2000»
13 years 8 months ago
Demand Transformation Analysis for Concurrent Constraint Programs
interpretation. In the context of stream parallelism, this analysis identi es an amount of input data for which predicate execution can safely wait without danger of introducing de...
Moreno Falaschi, Patrick Hicks, William H. Winsbor...