Sciweavers

4386 search results - page 538 / 878
» A Tamper-Resistant Programming Language System
Sort
View
ASPLOS
2006
ACM
15 years 10 months ago
Automatic generation of peephole superoptimizers
Peephole optimizers are typically constructed using human-written pattern matching rules, an approach that requires expertise and time, as well as being less than systematic at ex...
Sorav Bansal, Alex Aiken
ICCBR
2005
Springer
15 years 10 months ago
Opportunities for CBR in Learning by Doing
In this paper we partially describe JV2 M, a metaphorical simulation of the Java Virtual Machine where students can learn Java language compilation and reinforce object-oriented pr...
Pedro Pablo Gómez-Martín, Marco Anto...
SAC
2004
ACM
15 years 9 months ago
Self-maintained distributed tuples for field-based coordination in dynamic networks
Field-based coordination is a very promising approach for a wide range of application scenarios in modern dynamic networks. To implement such an approach, one can rely on distribu...
Marco Mamei, Franco Zambonelli
CD
2004
Springer
15 years 9 months ago
Keeping Control of Reusable Components
Development and deployment via components offers the possibility of prolific software reuse. However, to achieve this potential in a component-rich environment, it is necessary to...
Susan Eisenbach, Dilek Kayhan, Chris Sadler
CD
2004
Springer
15 years 9 months ago
Secure Deployment of Components
Abstract. The secure deployment of components is widely recognized as a crucial problem in component-based software engineering. While major effort is concentrated on preventing ma...
Mark Grechanik, Dewayne E. Perry