Sciweavers

12 search results - page 1 / 3
» scam 2005
Sort
View
SCAM
2005
IEEE
13 years 10 months ago
Dynamic Slicing of Java Bytecode Programs
Attila Szegedi, Tibor Gyimóthy
SCAM
2005
IEEE
13 years 10 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
SCAM
2005
IEEE
13 years 10 months ago
Transforming Embedded Java Code into Custom Tags
When a new technology is introduced, the migration of existing applications to the new technology must be carefully considered. Automation can make some migrations feasible that o...
Shannon Xu, Thomas R. Dean
SCAM
2005
IEEE
13 years 10 months ago
Control Flow Graph Reconstruction for Assembly Language Programs with Delayed Instructions
Most software for embedded systems, including digital signal processing systems, is coded in assembly language. For both understanding the software and for reverse compiling it to...
Nerina Bermudo, Andreas Krall, R. Nigel Horspool