Sciweavers

3456 search results - page 481 / 692
» Byte Code Engineering
Sort
View
107
Voted
ML
2006
ACM
122views Machine Learning» more  ML 2006»
15 years 9 months ago
Type-safe modular hash-consing
Hash-consing is a technique to share values that are structurally equal. Beyond the obvious advantage of saving memory blocks, hash-consing may also be used to speed up fundamenta...
Jean-Christophe Filliâtre, Sylvain Conchon
106
Voted
MSR
2006
ACM
15 years 9 months ago
Mining eclipse for cross-cutting concerns
Software may contain functionality that does not align with its architecture. Such cross-cutting concerns do not exist from the beginning but emerge over time. By analysing where ...
Silvia Breu, Thomas Zimmermann, Christian Lindig
112
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Uniform Application-level Access Control Enforcement of Organizationwide Policies
Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...
146
Voted
DATE
2005
IEEE
131views Hardware» more  DATE 2005»
15 years 9 months ago
Unified Modeling of Complex Real-Time Control Systems
Complex real-time control system is a software dense and algorithms dense system, which needs modern software engineering techniques to design. UML is an object-oriented industria...
He Hai, Zhong Yi-fang, Cai Chi-lan
141
Voted
ISESE
2005
IEEE
15 years 9 months ago
Managing software change tasks: an exploratory study
Programmers often have to perform change tasks that involve unfamiliar portions of a software system’s code base. To help inform the design of software development tools intende...
Jonathan Sillito, Kris De Volder, Brian Fisher, Ga...