Sciweavers

2000 search results - page 314 / 400
» Program Transformation and Proof Transformation
Sort
View
108
Voted
SAS
2007
Springer
106views Formal Methods» more  SAS 2007»
15 years 9 months ago
Guided Static Analysis
In static analysis, the semantics of the program is expressed as a set ions. The equations are solved iteratively over some abstract domain. If ract domain is distributive and sati...
Denis Gopan, Thomas W. Reps
DRM
2005
Springer
15 years 9 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
100
Voted
ICDM
2003
IEEE
91views Data Mining» more  ICDM 2003»
15 years 8 months ago
MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations
In the literature of data mining, many different algorithms for association rule mining have been proposed. However, there is relatively little study on how association rules can ...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang
114
Voted
SAS
2001
Springer
15 years 8 months ago
Solving Regular Tree Grammar Based Constraints
This paper describes the precise speci cation, design, analysis, implementation, and measurements of an e cient algorithm for solving regular tree grammar based constraints. The p...
Yanhong A. Liu, Ning Li, Scott D. Stoller
130
Voted
DAC
1999
ACM
15 years 7 months ago
Exact Memory Size Estimation for Array Computations without Loop Unrolling
This paper presents a new algorithm for exact estimation of the minimum memory size required by programs dealing with array computations. Memory size is an important factor a ecti...
Ying Zhao, Sharad Malik