Sciweavers

1821 search results - page 61 / 365
» Security-Aware Program Transformations
Sort
View
PEPM
2004
ACM
14 years 2 months ago
Proving termination of membership equational programs
Advanced typing, matching, and evaluation strategy features, as well as very general conditional rules, are routinely used in equational programming languages such as, for example...
Francisco Durán, Salvador Lucas, José...
LISP
2008
105views more  LISP 2008»
13 years 8 months ago
Proving operational termination of membership equational programs
Abstract Reasoning about the termination of equational programs in sophisticated equational languages such as ELAN, MAUDE, OBJ, CAFEOBJ, HASKELL, and so on, requires support for ad...
Francisco Durán, Salvador Lucas, Claude Mar...
DAGSTUHL
2007
13 years 10 months ago
Some Experiments on Tiling Loop Programs for Shared-Memory Multicore Architectures
The model-based transformation of loop programs is a way of detecting fine-grained parallelism in sequential programs. One of the challenges is to agglomerate the parallelism to a...
Armin Größlinger
CASES
2001
ACM
14 years 17 days ago
A new method for compiling schizophrenic synchronous programs
Synchronous programming languages have proved to be advantageous for designing software and hardware for embedded systems. Despite their clear semantics, their compilation is rema...
K. Schneider, M. Wenz
AUTOMATICA
2008
76views more  AUTOMATICA 2008»
13 years 9 months ago
Structured semidefinite programs for the control of symmetric systems
In this paper we show how the symmetry present in many linear systems can be exploited to significantly reduce the computational effort required for controller synthesis. This app...
Randy Cogill, Sanjay Lall, Pablo A. Parrilo