Sciweavers

1821 search results - page 34 / 365
» Security-Aware Program Transformations
Sort
View
98
Voted
PEPM
2004
ACM
15 years 7 months ago
Fusion with stacks and accumulating parameters
We propose a new algorithm for fusion transformation that allows both stacks and accumulating parameters. The new algorithm can fuse programs that cannot be handled by existing fu...
Susumu Nishimura
230
Voted
INFOCOM
2011
IEEE
14 years 5 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
107
Voted
ICMT
2009
Springer
15 years 6 months ago
Solving Constraints in Model Transformations
Abstract. Constraint programming holds many promises for model driven software development (MDSD). Up to now, constraints have only started to appear in MDSD modeling languages, bu...
Andreas Petter, Alexander Behring, Max Mühlh&...
94
Voted
SAC
2008
ACM
15 years 1 months ago
Preserving coordination properties when transforming concurrent system components
Complexity in concurrent or distributed systems can be managed by dividing component into smaller components. However, such transformations change the coordination behaviour betwe...
Gudmund Grov, Robert F. Pointon, Greg Michaelson, ...
114
Voted
SCAM
2009
IEEE
15 years 9 months ago
thr2csp: Toward Transforming Threads into Communicating Sequential Processes
—As multicore and heterogeneous multiprocessor platforms replace uniprocessor systems, software programs must be designed with a greater emphasis on concurrency. Threading has be...
Robert Charles Lange, Spiros Mancoridis