Sciweavers

ERSHOV
2003
Springer
15 years 6 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
ERSHOV
2003
Springer
15 years 6 months ago
TeXOR: Temporal XML Database on an Object-Relational Database System
Storage costs are rapidly decreasing, making it feasible to store larger amounts of data in databases. This also makes it possible to store previous versions of data in the databa...
Kjetil Nørvåg, Marit Limstrand, Lene ...
ERSHOV
2003
Springer
15 years 6 months ago
The Outside-In Method of Teaching Introductory Programming
The new design for the introductory programming course at ETH relies on object technology, Eiffel, extensive reuse, a graphics-rich library (TRAFFIC) built specifically for the c...
Bertrand Meyer
ERSHOV
2003
Springer
15 years 6 months ago
Data Mappings in the Model-View-Controller Pattern
The model-view-controller pattern is used to keep a data model and its views consistent. Usually there is a one-to-one correspondence between the data in the model and its represen...
Martin Rammerstorfer, Hanspeter Mössenbö...
ERSHOV
2003
Springer
15 years 6 months ago
Combining Aspects of Reactive Systems
For reactive systems, a large collection of formal models has been developed. While the formal relationship between those models is often carefully analyzed, the methodical implica...
Leonid Kof, Bernhard Schätz
Theoretical Computer Science
Top of PageReset Settings