Filters








38,208 Hits in 4.9 sec

A Class Grammar for General Games [chapter]

Cameron Browne
2016 Lecture Notes in Computer Science  
A class grammar is automatically generated from a given library of source code, from the constructors and associated parameters found along its class hierarchy, to give a context-free grammar that provides  ...  access to the underlying code while hiding its implementation details.  ...  Thanks to Stephen Tavener for nudging me towards Java, which proved ideal for this task.  ... 
doi:10.1007/978-3-319-50935-8_16 fatcat:x7is3ulqvrh67muw37u6zcjhbu

Page 3200 of Mathematical Reviews Vol. , Issue 88f [page]

1988 Mathematical Reviews  
A node label controlled (NLC) grammar is a device generating graphs, beginning with a start graph, by repeated application of context-free rules.  ...  .], the authors introduced the concepts of the supremal controllable sublanguage sup C(L) of a given language L c £* (with respect to a given M C L* and Xp) c ~) and of a monotone operator Q: 7% — 2, where  ... 

The Reuse of Grammars with Embedded Semantic Actions

T. Parr
2008 2008 16th IEEE International Conference on Program Comprehension  
The presence of arbitrary embedded semantic actions, however, makes reuse difficult with existing mechanisms such as grammar inheritance and modules.  ...  When combined with grammar composition, however, the prototype mechanism would improve grammar reuse because imported pre-existing grammars could be altered to suit each new application.  ...  Chris Recoski, Ari Steinberg, and Mike Kucera provided valuable information about the reuse of grammars in industry.  ... 
doi:10.1109/icpc.2008.36 dblp:conf/iwpc/Parr08 fatcat:h2y543gg4ratbbj7s43k75w5lm

Fuzzing the ActionScript virtual machine

Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
First, nearly-valid code snippets are randomly generated, with some controls on instruction flow.  ...  The complete source code should be both grammatically and semantically valid to allow execution by first passing through the compiler.  ...  Adding control to grammar rules The generated code should contain a diversity of grammar structures and runtime class interactions, while being easy to mutate and free of non-interesting code structure  ... 
doi:10.1145/2484313.2484372 dblp:conf/ccs/WenZLY13 fatcat:jmq225wjrnbktmma2bkpmrr4se

Grammar-driven generation of domain-specific language tools

Hui Wu
2006 Companion to the 21st ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications - OOPSLA '06  
The modified grammars generate the hooks needed to interface with a supporting infrastructure written for an Integrated Development Environment that assists in debugging, testing, and profiling a DSL program  ...  ., Java and C++). For example, support for debugging a program written in a DSL is often nonexistent.  ...  Acknowledgement This work was supported by an IBM Eclipse Innovation Grant.  ... 
doi:10.1145/1176617.1176718 dblp:conf/oopsla/Wu06 fatcat:xy73sfrd6nfevhzzc6j3smnguy

Page 362 of Mathematical Reviews Vol. 30, Issue 2 [page]

1965 Mathematical Reviews  
, the strong converse in the problem treated by Ash [Informa- tion and Control 6 (1963), 14-27 ; MR 28 #2933 ; correction, ibid. 7 (1964), 78-83].  ...  From the author’s introduction : “In this paper algorithms for construction of p-adic r-error correcting (group) codes are given and some bounds on the parameters of such codes are presented.” S.  ... 

BURG

Christopher W. Fraser, Robert R. Henry, Todd A. Proebsting
1992 SIGPLAN notices  
It was unbundled from CODEGEN with the support of Tera Computer. The current BURG was written by the third author with the support of NSF grant CCR-8908355.  ...  Robert Giegerich and Susan Graham organized the workshop, and the International Conference and Research Center for Computer Science, Schloss Dagstuhl, provided an ideal environment for such collaboration  ...  As the reducer visits (and possibly revisits) each node, user-supplied code implements semantic action side effects and controls the order in which subtrees are visited.  ... 
doi:10.1145/131080.131089 fatcat:ws6rivaexfefnd54vldeg3p4lm

How Does Rasch Model Reveal Dishonesty between Coastal Students and Easy Grammar Test?

Satria Agust
2019 Jurnal Iqra': Kajian Ilmu Pendidikan  
Academic dishonesty can occur with the supports of the technology devices and it also can be prevented with the help of the technology with its applications like Rasch Model.  ...  upon their origins and sex, and (3) expose their patterns in working on the grammar test in the form of multiple choice through the Rasch Model analysis.  ...  Such deeds and habits drag them over to the academic dishonesty. They always press their notebooks keyboards of control "C" and control "V".  ... 
doi:10.25217/ji.v4i2.531 fatcat:kys2mn7pzfcdndwa7ddcai7xka

Page 4653 of Mathematical Reviews Vol. , Issue 89H [page]

1989 Mathematical Reviews  
Summary: “By definition, a right convex language over X is an ideal of X*, and is also called a right convex ideal language.  ...  Theorem: For any LC X*, L is a right convex ideal language if and only if there exists a maximal prefix code P such that L = PX* and the following condition holds: w = w,w2 € P, w;,w2 € X* > wy X*w2X*NP  ... 

Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting

Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Zou
2007 Proceedings of the Computer Security Applications Conference  
Our evaluation on a Windows server program shows that this approach is superior to random black box fuzzing for increasing code coverage and depth of penetration into program control flow logic.  ...  Unlike many software testing tools, our implementation is strictly based upon binary code and does not require that source code be available.  ...  Our intelligent fuzz testing tool provides focused code coverage and targeted execution control by driving program execution to selective regions of interest in the code (which are suspected to contain  ... 
doi:10.1109/acsac.2007.4413013 fatcat:c5wcekqhd5czdfjleoadep2nny

Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting

Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Zou
2007 Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)  
Our evaluation on a Windows server program shows that this approach is superior to random black box fuzzing for increasing code coverage and depth of penetration into program control flow logic.  ...  Unlike many software testing tools, our implementation is strictly based upon binary code and does not require that source code be available.  ...  Our intelligent fuzz testing tool provides focused code coverage and targeted execution control by driving program execution to selective regions of interest in the code (which are suspected to contain  ... 
doi:10.1109/acsac.2007.27 dblp:conf/acsac/SparksECZ07 fatcat:g6evh3asanduvb3gsy4phzfgjq

Graphic Score Grammars For End-Users

Alistair G. Stead, Alan F. Blackwell, Samual Aaron
2012 Zenodo  
The visual grammar of the score, and its correspondence to the sound parameters, can be defined by the user with a simple visual condition-action language.  ...  interface, with a colour classifier and visual feature recogniser causing the grammar-specified events to be sent using OSC messages via Wi-Fi from the hand-held smartphone to an audio workstation.  ...  Ideally, we would like the composer and performer to be the same individual, creating a new digital artform that combines elements of composition and improvisation, as in Live Coding [1] .  ... 
doi:10.5281/zenodo.1178423 fatcat:yygjhigu6fes5h2ckx2eenkt7q

Complete and flexible replacement of chaotic uncertainty with transmitted information

Matthew B. Kennel, Shawn D. Pethel
2005 Physical Review E  
We also demonstrate control and data transmission at the channel capacity of the oscillator, the maximum possible data rate compatible with the grammar.  ...  We also demonstrate control and data transmission at the channel capacity of the oscillator, the maximum possible data rate compatible with the grammar.  ...  consistent with the grammar.  ... 
doi:10.1103/physreve.72.046212 pmid:16383517 fatcat:5dkrqrvimremvnkginvdfmunbq

A Grammar-Based Structural CNN Decoder for Code Generation

Zeyu Sun, Qihao Zhu, Lili Mou, Yingfei Xiong, Ge Li, Lu Zhang
2019 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Our model generates a program by predicting the grammar rules of the programming language; we design several CNN modules, including the tree-based convolution and pre-order convolution, whose information  ...  In this paper, we propose a grammar-based structural convolutional neural network (CNN) for code generation.  ...  Our model makes use of the abstract syntax tree (AST) of a program, and generates code by predicting the grammar rules.  ... 
doi:10.1609/aaai.v33i01.33017055 fatcat:yslbhyvfhvdgbchhvpq7mdtgca

A Grammar-Based Structural CNN Decoder for Code Generation [article]

Zeyu Sun, Qihao Zhu, Lili Mou, Yingfei Xiong, Ge Li, Lu Zhang
2018 arXiv   pre-print
Our model generates a program by predicting the grammar rules of the programming language; we design several CNN modules, including the tree-based convolution and pre-order convolution, whose information  ...  In this paper, we propose a grammar-based structural convolutional neural network (CNN) for code generation.  ...  Our model makes use of the abstract syntax tree (AST) of a program, and generates code by predicting the grammar rules.  ... 
arXiv:1811.06837v1 fatcat:aivrreovcngffgkyhtfw362nza
« Previous Showing results 1 — 15 out of 38,208 results