Sciweavers

3456 search results - page 531 / 692
» Byte Code Engineering
Sort
View
COMPSAC
2000
IEEE
15 years 7 months ago
A Practical Method for Watermarking Java Programs
Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled...
Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koj...
151
Voted
EUROMICRO
2000
IEEE
15 years 7 months ago
Concurrent Control Systems: From Grafcet to VHDL
The Automated Production Systems (APS) are composed of concurrent interacting entities. Then any model should exhibit parallel and sequential behaviours. The Grafcet is now well e...
Frédéric Mallet, Daniel Gaffé...
ICSM
2000
IEEE
15 years 7 months ago
Evolution in Open Source Software: A Case Study
Most studies of software evolution have been performed on systems developed within a single company using traditional management techniques. With the widespread availability of se...
Michael W. Godfrey, Qiang Tu
SIGSOFT
2000
ACM
15 years 7 months ago
Designing robust Java programs with exceptions
Exception handling mechanisms are intended to help developers build robust systems. Although an exception handling mechanism provides a basis for structuring source code dealing w...
Martin P. Robillard, Gail C. Murphy
APSEC
1999
IEEE
15 years 7 months ago
Enhancing Object-Based System Composition through Per-Object Mixins
The management of complexity in large systems is traditionally focused on the modeling and management of classes and hierarchies of classes. In order to improve the compositional ...
Gustaf Neumann, Uwe Zdun