Sciweavers

1628 search results - page 115 / 326
» Compiler Construction Using Scheme
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 3 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
POPL
2004
ACM
16 years 5 months ago
Incremental execution of transformation specifications
We aim to specify program transformations in a declarative style, and then to generate executable program transformers from such specifications. Many transformations require non-t...
Ganesh Sittampalam, Oege de Moor, Ken Friis Larsen
CC
2010
Springer
172views System Software» more  CC 2010»
15 years 12 months ago
Verifying Local Transformations on Relaxed Memory Models
The problem of locally transforming or translating programs without altering their semantics is central to the construction of correct compilers. For concurrent shared-memory progr...
Sebastian Burckhardt, Madanlal Musuvathi, Vasu Sin...
EUROPAR
2007
Springer
15 years 11 months ago
Program Behavior Characterization Through Advanced Kernel Recognition
Abstract. Understanding program behavior is at the foundation of program optimization. Techniques for automatic recognition of program constructs (from now on, computational kernel...
Manuel Arenaz, Juan Touriño, Ramon Doallo
PLDI
2003
ACM
15 years 10 months ago
Taming the IXP network processor
We compile Nova, a new language designed for writing network processing applications, using a back end based on integer-linear programming (ILP) for register allocation, optimal b...
Lal George, Matthias Blume