Sciweavers

730 search results - page 46 / 146
» Security-typed programming within dependently typed programm...
Sort
View
MICRO
1996
IEEE
97views Hardware» more  MICRO 1996»
14 years 19 days ago
Modulo Scheduling of Loops in Control-intensive Non-numeric Programs
Much of the previous work on modulo scheduling has targeted numeric programs, in which, often, the majority of the loops are well-behaved loop-counter-based loops without early ex...
Daniel M. Lavery, Wen-mei W. Hwu
TYPES
2004
Springer
14 years 1 months ago
Exploring the Regular Tree Types
In this paper we use the Epigram language to define the universe of regular tree types—closed under empty, unit, sum, product and least fixpoint. We then present a generic deci...
Peter Morris, Thorsten Altenkirch, Conor McBride
APAQS
2001
IEEE
14 years 4 days ago
A Path-Based Approach to the Detection of Infinite Looping
Infinite looping is a common type of program error. This paper studies the detection of infinite loops in imperative programs. A sufficient condition is given, which is based on p...
Jian Zhang
BMCBI
2010
128views more  BMCBI 2010»
13 years 8 months ago
VIGOR, an annotation program for small viral genomes
Background: The decrease in cost for sequencing and improvement in technologies has made it easier and more common for the re-sequencing of large genomes as well as parallel seque...
Shiliang Wang, Jaideep P. Sundaram, David Spiro
IEEEIAS
2007
IEEE
14 years 2 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...