Sciweavers

3456 search results - page 590 / 692
» Byte Code Engineering
Sort
View
127
Voted
CCS
2007
ACM
15 years 8 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
102
Voted
EMSOFT
2007
Springer
15 years 8 months ago
E-FRP with priorities
E-FRP is declarative language for programming resourcebounded, event-driven systems. The original high-level semantics of E-FRP requires that each event handler execute atomically...
Roumen Kaiabachev, Walid Taha, Angela Yun Zhu
114
Voted
ER
2007
Springer
193views Database» more  ER 2007»
15 years 8 months ago
Applying Model Transformation By-Example on Business Process Modeling Languages
Model transformations are playing a vital role in the field of model engineering. However, for non-trivial transformation issues most approaches require imperative definitions, w...
Michael Strommer, Marion Murzek, Manuel Wimmer
94
Voted
FSTTCS
2007
Springer
15 years 8 months ago
Closures and Modules Within Linear Logic Concurrent Constraint Programming
There are two somewhat contradictory ways of looking at modules in a given programming language. On the one hand, module systems are largely independent of the particulars of progr...
Rémy Haemmerlé, François Fage...
GPCE
2007
Springer
15 years 8 months ago
Generative programming techniques for Java library migration
Embedded systems can be viewed as scaled-down versions of their one counterparts. In many cases, the software abstractions and libraries for embedded systems can be derived from l...
Victor L. Winter, Azamatbek Mametjanov