Pointer analysis is traditionally performed once, early in the compilation process, upon an intermediate representation (IR) with source-code semantics. However, performing pointe...
Bolei Guo, Matthew J. Bridges, Spyridon Triantafyl...
Abstract. The many approaches which have been proposed in the literature for proving the correctness of unfold/fold program transformations, consist in associating suitable well-fo...
Alberto Pettorossi, Maurizio Proietti, Valerio Sen...
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...
It is well known that the performance of a program can often be improved by means of program transformation. Several program transformation techniques, eg. partial evaluation, wor...