Sciweavers

1821 search results - page 283 / 365
» Security-Aware Program Transformations
Sort
View
SAS
1997
Springer
111views Formal Methods» more  SAS 1997»
14 years 15 days ago
Fast and Effective Procedure Inlining
is an important optimization for programs that use procedural abstraction. Because inlining trades code size for execution speed, the effectiveness of an inlining algorithm is det...
Oscar Waddell, R. Kent Dybvig
FLOPS
2008
Springer
13 years 10 months ago
Semantics and Pragmatics of New Shortcut Fusion Rules
We study various shortcut fusion rules for languages like Haskell. Following a careful semantic account of a recently proposed rule for circular program transformation, we propose ...
Janis Voigtländer
DAGSTUHL
2007
13 years 10 months ago
The Unique Games Conjecture with Entangled Provers is False
We consider one-round games between a classical verifier and two provers who share entanglement. We show that when the constraints enforced by the verifier are ‘unique’ cons...
Julia Kempe, Oded Regev, Ben Toner
CATA
2003
13 years 10 months ago
Implementation and Performance Evaluation of Intel VTUNE Image Processing Functions in the MATLAB Environment
Many current general purpose processors use extensions to the instruction set architecture to enhance the performance of digital image processing and multimedia applications. In t...
Phaisit Chewputtanagul, David Jeff Jackson, Kennet...
ACL
1997
13 years 10 months ago
An Alignment Method for Noisy Parallel Corpora based on Image Processing Techniques
This paper presents a new approach to bitext correspondence problem (BCP) of noisy bilingual corpora based on image processing (IP) techniques. By using one of several ways of est...
Jason S. Chang, Mathis H. M. Chen