Sciweavers

1821 search results - page 75 / 365
» Security-Aware Program Transformations
Sort
View
IV
2003
IEEE
150views Visualization» more  IV 2003»
14 years 2 months ago
Adapting Single-User Visualization Software for Collaborative Use
This paper presents our experiences with adapting single-user visualization software for web-based collaboration. Sun’s Java JXTA API was used to adapt an opensource molecular v...
Francis T. Marchese, Jude Mercado, Yi Pan
IFIP
1992
Springer
14 years 1 months ago
Implementations of IF-statements in the TODOS microarchitecture synthesis system
In microarchitecure synthesis, early algorithms considered only a single implementation technique for IF -statements. Focus was on scheduling and on maximum hardware sharing. In t...
Peter Marwedel
IJFCS
2008
81views more  IJFCS 2008»
13 years 9 months ago
Reachability Analysis in Verification via Supercompilation
Abstract. We present an approach to verification of parameterized systems, which is based on program transformation technique known as supercompilation. In this approach the statem...
Alexei Lisitsa, Andrei P. Nemytykh
IPL
2007
78views more  IPL 2007»
13 years 8 months ago
Ensuring the quasi-termination of needed narrowing computations
We present a characterization of first-order functional programs which are quasiterminating w.r.t. the symbolic execution mechanism of needed narrowing, i.e., computations in the...
J. Guadalupe Ramos, Josep Silva, Germán Vid...
FPCA
1995
14 years 15 days ago
The Functional Side of Logic Programming
In this paper we study the relationships between logic programming and functional programming, trying to answer the following basic question: to what extent is logic programming j...
Massimo Marchiori