Sciweavers

1821 search results - page 33 / 365
» Security-Aware Program Transformations
Sort
View
ENTCS
2006
151views more  ENTCS 2006»
13 years 8 months ago
Extending C for Checking Shape Safety
The project Safe Pointers by Graph Transformation at the University of York has developed a method for specifying the shape of pointer-data structures by graph reduction, and a st...
Mike Dodds, Detlef Plump
LPNMR
1997
Springer
14 years 1 months ago
Improving the Alternating Fixpoint: The Transformation Approach
We present a bottom-up algorithm for the computation of the well-founded model of non-disjunctive logic programs which is based on the set of elementary program transformations stu...
Ulrich Zukowski, Burkhard Freitag, Stefan Brass
IWFM
1998
117views Formal Methods» more  IWFM 1998»
13 years 10 months ago
A Case Study on Proving Transformations Correct: Data-Parallel Conversion
The issue of correctness in the context of a certain style of program transformation is investigated. This style is characterised by the fully automated application of large numbe...
Stephen Kilpatrick, Maurice Clint, Peter Kilpatric...
ENTCS
2008
62views more  ENTCS 2008»
13 years 9 months ago
Undecidable Control Conditions in Graph Transformation Units
Graph transformation units are an approach-independent concept for programming by applying rules and imported transformation units to graphs, starting in an initial and ending in ...
Karsten Hölscher, Renate Klempien-Hinrichs, P...