Sciweavers

1821 search results - page 56 / 365
» Security-Aware Program Transformations
Sort
View
IPPS
1999
IEEE
14 years 1 months ago
A Structured Approach to Parallel Programming: Methodology and Models
Parallel programming continues to be difficult, despite substantial and ongoing research aimed at making it tractable. Especially dismaying is the gulf between theory and the pract...
Berna L. Massingill
STEP
2005
IEEE
14 years 2 months ago
TETE: A Non-Invasive Unit Testing Framework for Source Transformation
While the use of test-driven development as a debugging, pedagogic, and analytical methodology for objectoriented and procedural systems is well documented, it is a relatively une...
Derek M. Shimozawa, James R. Cordy
SAS
2007
Springer
128views Formal Methods» more  SAS 2007»
14 years 3 months ago
Magic-Sets Transformation for the Analysis of Java Bytecode
Denotational static analysis of Java bytecode has a nice and clean compositional definition and an efficient implementation with binary decision diagrams. But it models only the f...
Étienne Payet, Fausto Spoto
ICPP
1999
IEEE
14 years 1 months ago
A Framework for Interprocedural Locality Optimization Using Both Loop and Data Layout Transformations
There has been much work recently on improving the locality performance of loop nests in scientific programs through the use of loop as well as data layout optimizations. However,...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
HIPC
2000
Springer
14 years 15 days ago
Improving Offset Assignment on Embedded Processors Using Transformations
Embedded systems consisting of the application program ROM, RAM, the embedded processor core and any custom hardware on a single wafer are becoming increasingly common in areas suc...
Sunil Atri, J. Ramanujam, Mahmut T. Kandemir