Sciweavers

1821 search results - page 83 / 365
» Security-Aware Program Transformations
Sort
View
ICPR
2008
IEEE
14 years 10 months ago
Graph-based classification for multiple observations of transformed patterns
We consider the problem of classification when multiple observations of a pattern are available, possibly under different transformations. We view this problem as a special case o...
Effrosini Kokiopoulou, Pascal Frossard, Stefanos P...
ECBS
2006
IEEE
166views Hardware» more  ECBS 2006»
14 years 3 months ago
Model Transformations in the Model-Based Development of Real-time Systems
In this paper we argue for UML-based metamodeling and pattern-based graph transformation techniques in computer-based systems development through an illustrative example from the ...
Tivadar Szemethy, Gabor Karsai, Daniel Balasubrama...
LCPC
2004
Springer
14 years 2 months ago
Experiences in Using Cetus for Source-to-Source Transformations
Cetus is a compiler infrastructure for the source-to-source transformation of programs. Since its creation nearly three years ago, it has grown to over 12,000 lines of Java code, b...
Troy A. Johnson, Sang Ik Lee, Long Fei, Ayon Basum...
FPL
2001
Springer
88views Hardware» more  FPL 2001»
14 years 1 months ago
FPGA-Based Discrete Wavelet Transforms System
Although FPGA technology offers the potential of designing high performance systems at low cost, its programming model is prohibitively low level. To allow a novice signal/image pr...
Mokhtar Nibouche, Ahmed Bouridane, Fionn Murtagh, ...
ISMVL
1999
IEEE
90views Hardware» more  ISMVL 1999»
14 years 1 months ago
Transformations between Signed and Classical Clause Logic
In the last years two automated reasoning techniques for clause normal form arose in which the use of labels are prominently featured: signed logic and annotated logic programming...
Bernhard Beckert, Reiner Hähnle, Felip Many&a...