Sciweavers

1882 search results - page 44 / 377
» Transformational Programming and Forests
Sort
View
SCAM
2005
IEEE
15 years 3 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...
ECOOP
2009
Springer
15 years 4 months ago
Program Metamorphosis
Modern development environments support refactoring by providing atomically behaviour-preserving transformations. While useful, these transformations are limited in three ways: (i)...
Christoph Reichenbach, Devin Coughlin, Amer Diwan
LFP
1992
153views more  LFP 1992»
14 years 11 months ago
Reasoning About Programs in Continuation-Passing Style
The CPS transformation dates back to the early 1970's, where it arose as a technique to represent the control flow of programs in -calculus based programming languages as -te...
Amr Sabry, Matthias Felleisen
CCS
2007
ACM
15 years 3 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
TOOLS
1998
IEEE
15 years 2 months ago
Macro Processing in Object-Oriented Languages
There are a number of programmable macro systems such as Lisp's. While they can handle complex program transformation, they still have difficulty in handling some kinds of tr...
Shigeru Chiba