Sciweavers

2947 search results - page 97 / 590
» Analyzing Program Analyses
Sort
View
POPL
1996
ACM
15 years 6 months ago
Discovering Auxiliary Information for Incremental Computation
This paper presents program analyses and transformations that discover a general class of auxiliary information for any incremental computation problem. Combining these techniques...
Yanhong A. Liu, Scott D. Stoller, Tim Teitelbaum
138
Voted
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 6 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
124
Voted
INFORMATICALT
2007
101views more  INFORMATICALT 2007»
15 years 2 months ago
Internationalization of Compilers
Internationalization of compilers and localization of programming languages is not a usual phenomenon yet; however, due to a rapid progress of software and programming technologies...
Valentina Dagiene, Rimgaudas Laucius
109
Voted
CONCURRENCY
2004
124views more  CONCURRENCY 2004»
15 years 2 months ago
Checking ownership and confinement
Abstract. A number of formal proposals to manage aliasing in Java-like programming languages have been advanced over the last five years. Unfortunately, it is not clear how practic...
Alex Potanin, James Noble, Robert Biddle
131
Voted
FMOODS
2008
15 years 4 months ago
Termination Analysis of Java Bytecode
Abstract. Termination analysis has received considerable attention, traditionally in the context of declarative programming, and recently also for imperative languages. In existing...
Elvira Albert, Puri Arenas, Michael Codish, Samir ...