Program Analysis and Transformation
Subject COMP90053 (2016)
Note: This is an archived Handbook entry from 2016.
Credit Points: | 12.5 |
---|---|
Level: | 9 (Graduate/Postgraduate) |
Dates & Locations: | This subject is not offered in 2016. |
Time Commitment: | Contact Hours: 36 hours, comprising of two 1-hour lectures and one 1-hour workshop per week Total Time Commitment: 200 hours |
Prerequisites: | One of the following: Subject Study Period Commencement: Credit Points: |
Corequisites: | None |
Recommended Background Knowledge: |
Basic proficiency in discrete mathematics.
|
Non Allowed Subjects: | None |
Core Participation Requirements: |
For the purposes of considering request for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Student Support and Engagement Policy, academic requirements for this subject are articulated in the Subject Overview, Learning Outcomes, Assessment and Generic Skills sections of this entry. It is University policy to take all reasonable steps to minimise the impact of disability upon academic study, and reasonable adjustments will be made to enhance a student's participation in the University's programs. Students who feel their disability may impact on meeting the requirements of this subject are encouraged to discuss this matter with a Faculty Student Adviser and Student Equity and Disability Support: http://services.unimelb.edu.au/disability |
Subject Overview: |
AIMS In the 1930s, Alan Turing and Konrad Zuse independently proposed designs of computing machines based on the idea that storage used for data and storage used for instructions be indistinguishable. This “stored-program” model formed the blueprint for all modern computers. The ability to treat programs as data turned out to be very powerful, as it meant that a program could be designed to read, generate, analyse and/or transform other programs, and even modify itself while running. This subject is concerned with meta-programs - programs that work on other programs, possibly generating programs as output. People routinely read, generate, analyse, test, and transform programs. For example, a programmer may look through code for potential buffer overruns, and may add runtime tests to avoid the security problems that could result. It is preferable, however, to automate such activity as far as we can, partly because that makes programmers more productive, and partly because computers generally are better at these tasks, avoiding human oversights and mistakes. This subject introduces the main techniques and applications of program analysis and transformation, including methods used by modern optimizing compilers and allied tools.
INDICATIVE CONTENT
|
---|---|
Learning Outcomes: |
INTENDED LEARNING OUTCOMES (ILO) On completion of this subject, students should have the following skills:
|
Assessment: |
|
Prescribed Texts: | None |
Breadth Options: | This subject is not available as a breadth subject. |
Fees Information: | Subject EFTSL, Level, Discipline & Census Date |
Generic Skills: |
On completion of the subject, students should have the following skills:
|
Notes: |
LEARNING AND TEACHING METHODS The subject involves two 1-hour lectures per week followed by a 1-hour workshop. Weekly tutorial problems are assigned and discussed in class. The programming project is pivotal, as the subject relies heavily on learning-by-doing. Students work in small groups to implement a sophisticated program analysis tool of practical value. Students are encouraged to share ideas and artefacts, such as developed test data. More generally, “contributing student pedagogy” is utilised as a community-building tool. Accordingly, in-plenum discussion of the project is allowed, and encouraged.
INDICATIVE KEY LEARNING RESOURCES The subject uses online reading materials and an online discussion forum. It offers advance access to teaching materials, including slides used in lectures.
CAREERS / INDUSTRY LINKS Semantics-based formal approaches are increasingly important in software engineering and software development, in particular for security- and safety-critical applications. |
Related Course(s): |
Master of Information Technology Master of Information Technology Master of Science (Computer Science) |
Related Majors/Minors/Specialisations: |
B-ENG Software Engineering stream MIT Computing Specialisation MIT Distributed Computing Specialisation Master of Engineering (Software) |
Download PDF version.