Sciweavers

1173 search results - page 51 / 235
» Program Derivation Using Analogy
Sort
View
JSC
2010
106views more  JSC 2010»
15 years 29 days ago
Verifying pointer safety for programs with unknown calls
We study the automated verification of pointer safety for heap-manipulating imperative programs with unknown procedure calls. Given a Hoare-style partial correctness specificati...
Chenguang Luo, Florin Craciun, Shengchao Qin, Guan...
SAS
2005
Springer
118views Formal Methods» more  SAS 2005»
15 years 8 months ago
Inference of Well-Typings for Logic Programs with Application to Termination Analysis
A method is developed to infer a polymorphic well-typing for a logic program. Our motivation is to improve the automation of termination analysis by deriving types from which norms...
Maurice Bruynooghe, John P. Gallagher, Wouter Van ...
107
Voted
TPDS
2010
93views more  TPDS 2010»
15 years 27 days ago
On the Interplay of Parallelization, Program Performance, and Energy Consumption
—This paper derives simple, yet fundamental formulas to describe the interplay between parallelism of an application, program performance, and energy consumption. Given the ratio...
Sangyeun Cho, Rami G. Melhem
PLILP
1994
Springer
15 years 6 months ago
Dynamic Dependence in Term rewriting Systems and its Application to Program Slicing
Abstract. Program slicing is a useful technique for debugging, testing, and analyzing programs. A program slice consists of the parts of a program which (potentially) affect the va...
John Field, Frank Tip
112
Voted
ICFP
2008
ACM
16 years 2 months ago
NixOS: a purely functional Linux distribution
Existing package and system configuration management tools suffer from an imperative model, where system administration actions such as upgrading packages or changes to system con...
Andres Löh, Eelco Dolstra