Sciweavers

2000 search results - page 311 / 400
» Program Transformation and Proof Transformation
Sort
View
155
Voted
IANDC
2010
125views more  IANDC 2010»
15 years 26 days ago
A thread calculus with molecular dynamics
In a previous paper, we developed an algebraic theory of threads, interleaving of threads, and interaction between threads and services. In the current paper, we extend that theory...
Jan A. Bergstra, C. A. Middelburg
140
Voted
VLSISP
2011
231views Database» more  VLSISP 2011»
14 years 10 months ago
Loop Distribution and Fusion with Timing and Code Size Optimization
Loop distribution and loop fusion are two effective loop transformation techniques to optimize the execution of the programs in DSP applications. In this paper, we propose a new t...
Meilin Liu, Edwin Hsing-Mean Sha, Qingfeng Zhuge, ...
ENASE
2010
121views Hardware» more  ENASE 2010»
14 years 10 months ago
Generation Mechanisms in Graphical Template Language
Textual models in MDD typically are generated in their concrete syntax using a template based language. On the contrary, graphical models as a generated in abstract syntax and then...
Elina Kalnina, Audris Kalnins, Edgars Celms, Agris...
ISPASS
2008
IEEE
15 years 10 months ago
Pinpointing and Exploiting Opportunities for Enhancing Data Reuse
—The potential for improving the performance of data-intensive scientific programs by enhancing data reuse in cache is substantial because CPUs are significantly faster than me...
Gabriel Marin, John M. Mellor-Crummey
131
Voted
CCS
2009
ACM
15 years 6 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...