Sciweavers

1821 search results - page 34 / 365
» Security-Aware Program Transformations
Sort
View
PEPM
2004
ACM
14 years 2 months ago
Fusion with stacks and accumulating parameters
We propose a new algorithm for fusion transformation that allows both stacks and accumulating parameters. The new algorithm can fuse programs that cannot be handled by existing fu...
Susumu Nishimura
INFOCOM
2011
IEEE
13 years 8 days ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
ICMT
2009
Springer
14 years 1 months ago
Solving Constraints in Model Transformations
Abstract. Constraint programming holds many promises for model driven software development (MDSD). Up to now, constraints have only started to appear in MDSD modeling languages, bu...
Andreas Petter, Alexander Behring, Max Mühlh&...
SAC
2008
ACM
13 years 8 months ago
Preserving coordination properties when transforming concurrent system components
Complexity in concurrent or distributed systems can be managed by dividing component into smaller components. However, such transformations change the coordination behaviour betwe...
Gudmund Grov, Robert F. Pointon, Greg Michaelson, ...
SCAM
2009
IEEE
14 years 3 months ago
thr2csp: Toward Transforming Threads into Communicating Sequential Processes
—As multicore and heterogeneous multiprocessor platforms replace uniprocessor systems, software programs must be designed with a greater emphasis on concurrency. Threading has be...
Robert Charles Lange, Spiros Mancoridis