|
Conferences in DBLP
- James R. Cordy
Source transformation, analysis and generation in TXL. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:1-11 [Conf]
- Jonathan Cooper, Steve McKeever, Alan Garny
On the application of partial evaluation to the optimisation of cardiac electrophysiological simulations. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:12-20 [Conf]
- Stephen A. Edwards
Using program specialization to speed SystemC fixed-point simulation. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:21-28 [Conf]
- Sarah Thompson, Alan Mycroft
Bit-level partial evaluation of synchronous circuits. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:29-37 [Conf]
- Futoshi Iwama, Atsushi Igarashi, Naoki Kobayashi
Resource usage analysis for a functional language with exceptions. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:38-47 [Conf]
- Micah Lewis, Michael Jones
A dead variable analysis for explicit model checking. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:48-57 [Conf]
- Christian Hammer, Martin Grimme, Jens Krinke
Dynamic path conditions in dependence graphs. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:58-67 [Conf]
- Roberto E. Lopez-Herrejon, Don S. Batory, Christian Lengauer
A disciplined approach to aspect composition. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:68-77 [Conf]
- Meng Wang, Kung Chen, Siau-Cheng Khoo
Type-directed weaving of aspects for higher-order functional languages. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:78-87 [Conf]
- Michael Leuschel, Daniel Elphick, Mauricio Varea, Stephen-John Craig, Marc Fontaine
The Ecce and Logen partial evaluators and their web interfaces. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:88-94 [Conf]
- Martin Bravenboer, Karl Trygve Kalleberg, Rob Vermaas, Eelco Visser
Stratego/XT 0.16: components for transformation systems. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:95-99 [Conf]
- Thomas W. Reps, Gogul Balakrishnan, Junghee Lim
Intermediate-representation recovery from low-level code. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:100-111 [Conf]
- Yanhong A. Liu, Chen Wang, Michael Gorbovitski, Tom Rothamel, Yongxi Cheng, Yingchao Zhao, Jing Zhang
Core role-based access control: efficient implementations by transformations. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:112-120 [Conf]
- Beatrice Luca, Stefan Andrei, Hugh Anderson, Siau-Cheng Khoo
Program transformation by solving recurrences. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:121-129 [Conf]
- Martin Erwig, Zhe Fu, Ben Pflaum
Generic programming in Fortran. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:130-139 [Conf]
- Matias Madou, Ludo Van Put, Koen De Bosschere
LOCO: an interactive code (De)obfuscation tool. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:140-144 [Conf]
- Emmanuel Geay, Eran Yahav, Stephen J. Fink
Continuous code-quality assurance with SAFE. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:145-149 [Conf]
- Todd L. Veldhuizen
Tradeoffs in metaprogramming. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:150-159 [Conf]
- Kedar N. Swadi, Walid Taha, Oleg Kiselyov, Emir Pasalic
A monadic approach for avoiding code duplication when staging memoized functions. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:160-169 [Conf]
|