Sciweavers

1628 search results - page 115 / 326
» Compiler Construction Using Scheme
Sort
View
142
Voted
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 28 days ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
235
Voted
POPL
2004
ACM
16 years 2 months ago
Incremental execution of transformation specifications
We aim to specify program transformations in a declarative style, and then to generate executable program transformers from such specifications. Many transformations require non-t...
Ganesh Sittampalam, Oege de Moor, Ken Friis Larsen
119
Voted
CC
2010
Springer
172views System Software» more  CC 2010»
15 years 9 months ago
Verifying Local Transformations on Relaxed Memory Models
The problem of locally transforming or translating programs without altering their semantics is central to the construction of correct compilers. For concurrent shared-memory progr...
Sebastian Burckhardt, Madanlal Musuvathi, Vasu Sin...
109
Voted
EUROPAR
2007
Springer
15 years 8 months ago
Program Behavior Characterization Through Advanced Kernel Recognition
Abstract. Understanding program behavior is at the foundation of program optimization. Techniques for automatic recognition of program constructs (from now on, computational kernel...
Manuel Arenaz, Juan Touriño, Ramon Doallo
118
Voted
PLDI
2003
ACM
15 years 7 months ago
Taming the IXP network processor
We compile Nova, a new language designed for writing network processing applications, using a back end based on integer-linear programming (ILP) for register allocation, optimal b...
Lal George, Matthias Blume