Sciweavers

1821 search results - page 6 / 365
» Security-Aware Program Transformations
Sort
View
PLDI
2011
ACM
12 years 10 months ago
Safe optimisations for shared-memory concurrent programs
Current proposals for concurrent shared-memory languages, including C++ and C, provide sequential consistency only for programs without data races (the DRF guarantee). While the i...
Jaroslav Sevcík
CAISE
2003
Springer
14 years 24 days ago
Exploiting Generalization for the Composition of Transformations of XML Schema Based Documents
Abstract. Open exchange of electronic documents in XML formats frequently requires the transformation to different XML-Schemas or DTDs (document type description). We propose a tr...
Marek Lehmann
JMLR
2012
11 years 10 months ago
Metric and Kernel Learning Using a Linear Transformation
Metric and kernel learning arise in several machine learning applications. However, most existing metric learning algorithms are limited to learning metrics over low-dimensional d...
Prateek Jain, Brian Kulis, Jason V. Davis, Inderji...
ENTCS
2008
119views more  ENTCS 2008»
13 years 7 months ago
An Example of Cloning Graph Transformation Rules for Programming
Graphical notations are already popular for the design of software, as witnessed by the success of the Uniform Modeling Languages (UML). In this paper, we advocate the use of grap...
Mark Minas, Berthold Hoffmann