Sciweavers

1821 search results - page 305 / 365
» Security-Aware Program Transformations
Sort
View
189
Voted
DLS
2009
227views Languages» more  DLS 2009»
14 years 10 months ago
The ruby intermediate language
Ruby is a popular, dynamic scripting language that aims to "feel natural to programmers"and give users the"freedom to choose" among many different ways of doin...
Michael Furr, Jong-hoon (David) An, Jeffrey S. Fos...
SIGSOFT
2005
ACM
16 years 1 months ago
ASTEC: a new approach to refactoring C
The C language is among the most widely used in the world, particularly for critical infrastructure software. C programs depend upon macros processed using the C preprocessor, but...
Bill McCloskey, Eric A. Brewer
119
Voted
SIGSOFT
2003
ACM
16 years 1 months ago
Consistency techniques for interprocedural test data generation
This paper presents a novel approach for automated test data generation of imperative programs containing integer, boolean and/or float variables. It extends our previous work to ...
Nguyen Tran Sy, Yves Deville
197
Voted
POPL
2009
ACM
16 years 1 months ago
Bidirectionalization for free! (Pearl)
A bidirectional transformation consists of a function get that takes a source (document or value) to a view and a function put that takes an updated view and the original source b...
Janis Voigtländer
94
Voted
ICFP
2008
ACM
16 years 24 days ago
Functional netlists
In efforts to overcome the complexity of the syntax and the lack of formal semantics of conventional hardware description languages, a number of functional hardware description la...
Sungwoo Park, Jinha Kim, Hyeonseung Im