Sciweavers

3456 search results - page 311 / 692
» Byte Code Engineering
Sort
View
SIGCSE
2009
ACM
144views Education» more  SIGCSE 2009»
16 years 5 months ago
A model academic ethics and integrity policy for computer science departments
For decades, US universities and colleges have had policies pertaining to the conduct of their students at the institutional level. These policies are referred to as Academic Inte...
Charles Riedesel, Eric D. Manley, Susan Poser, Jit...
CCS
2009
ACM
15 years 11 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
15 years 11 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
FOAL
2009
ACM
15 years 11 months ago
Enhancing base-code protection in aspect-oriented programs
Aspect-oriented programming (AOP) promises to localize concerns that inherently crosscut the primary structural decomposition of a software system. Localization of concerns is cri...
Mohamed ElBendary, John Boyland
PPOPP
2005
ACM
15 years 10 months ago
Static analysis of atomicity for programs with non-blocking synchronization
In concurrent programming, non-blocking synchronization is very efficient but difficult to design correctly. This paper presents a static analysis to show that code blocks are ato...
Liqiang Wang, Scott D. Stoller