Sciweavers

1821 search results - page 41 / 365
» Security-Aware Program Transformations
Sort
View
ILP
2003
Springer
14 years 2 months ago
Query Optimization in Inductive Logic Programming by Reordering Literals
Query optimization is used frequently in relational database management systems. Most existing techniques are based on reordering the relational operators, where the most selective...
Jan Struyf, Hendrik Blockeel
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 6 months ago
A Simple Correctness Proof for Magic Transformation
The paper presents a simple and concise proof of correctness of the magic transformation. We believe it may provide a useful example of formal reasoning about logic programs. The ...
Wlodzimierz Drabent
IV
2006
IEEE
130views Visualization» more  IV 2006»
14 years 2 months ago
Ontology Driven Visualisation of Maps with SVG - An Example for Semantic Programming
This article describes a particular use of ontologies for visualising maps in a browser window. Geographic data are represented as instances of concepts in an ontology of transpor...
Frank Ipfelkofer, Bernhard Lorenz, Hans Jürge...
POPL
1997
ACM
14 years 1 months ago
Synchronization Transformations for Parallel Computing
As parallel machines become part of the mainstream computing environment, compilers will need to apply synchronization optimizations to deliver e cient parallel software. This pap...
Pedro C. Diniz, Martin C. Rinard
ENTCS
2002
106views more  ENTCS 2002»
13 years 8 months ago
Refactoring by Transformation
In this paper we present how refactoring of object-oriented programs can be accomplished by using refinement. Our approach is based on algebraic laws of an object-oriented languag...
Márcio Cornélio, Ana Cavalcanti, Aug...