Sciweavers

1821 search results - page 51 / 365
» Security-Aware Program Transformations
Sort
View
HICSS
2010
IEEE
159views Biometrics» more  HICSS 2010»
14 years 3 months ago
Towards a Systematic Approach for Capturing Dynamic Transformation in Enterprise Models
The transparency created by enterprise models is a valuable support for organizational engineering and especially enterprise transformation. However, current approaches are hardly...
Stephan Aier, Bettina Gleichauf
ECWEB
2003
Springer
110views ECommerce» more  ECWEB 2003»
14 years 2 months ago
Transformation of XML Data Using an Unranked Tree Transducer
Transformation of data documents is of special importance to use XML as the universal data interchange format on the Web. Data transformation is used in many tasks that require dat...
Tadeusz Pankowski
AADEBUG
1993
Springer
14 years 1 months ago
Slicing Programs with Arbitrary Control-flow
Program slicing is a program transformation that is useful in program debugging, program maintenance, and other applications that involve understanding program behavior. Given a p...
Thomas Ball, Susan Horwitz
PDS
1996
13 years 10 months ago
Towards a theory of shared data in distributed systems
We have developed a theory of sharing which captures the behaviour of programs with respect to shared data into the framework of process algebra. The core theory can describe prog...
Simon A. Dobson, Christopher P. Wadsworth
PLDI
1995
ACM
14 years 13 days ago
Unifying Data and Control Transformations for Distributed Shared Memory Machines
We present a unified approach to locality optimization that employs both data and control transformations. Data transformations include changing the array layout in memory. Contr...
Michal Cierniak, Wei Li