Sciweavers

2000 search results - page 266 / 400
» Program Transformation and Proof Transformation
Sort
View
IPPS
2008
IEEE
15 years 10 months ago
Towards effective automatic parallelization for multicore systems
The ubiquity of multicore processors in commodity computing systems has raised a significant programming challenge for their effective use. An attractive but challenging approach...
Uday Bondhugula, Muthu Manikandan Baskaran, Albert...
124
Voted
MSR
2006
ACM
15 years 9 months ago
Are refactorings less error-prone than other changes?
Refactorings are program transformations which should preserve the program behavior. Consequently, we expect that during phases when there are mostly refactorings in the change hi...
Peter Weißgerber, Stephan Diehl
119
Voted
FOSSACS
2005
Springer
15 years 9 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
109
Voted
IWDW
2005
Springer
15 years 9 months ago
Towards Multi-class Blind Steganalyzer for JPEG Images
In this paper, we use the previously proposed calibrated DCT features [9] to construct a Support Vector Machine classifier for JPEG images capable of recognizing which steganograp...
Tomás Pevný, Jessica J. Fridrich
106
Voted
WEBI
2004
Springer
15 years 9 months ago
Using Semantic Graphs in Clustering Process : Enhance Information Level
In this paper, we particularly focused our attention on how to enhance expressivity of ontologies when used as organized space values in a catalogue request process. Using the Wis...
Jean-Sébastien Brunner, Isabelle Berrien