Sciweavers

3456 search results - page 608 / 692
» Byte Code Engineering
Sort
View
HIPEAC
2009
Springer
15 years 6 months ago
Deriving Efficient Data Movement from Decoupled Access/Execute Specifications
Abstract. On multi-core architectures with software-managed memories, effectively orchestrating data movement is essential to performance, but is tedious and error-prone. In this p...
Lee W. Howes, Anton Lokhmotov, Alastair F. Donalds...
ACSAC
2004
IEEE
15 years 6 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
CAISE
2006
Springer
15 years 6 months ago
A Method for Functional Alignment Verification in Hierarchical Enterprise Models
Enterprise modeling involves multiple domains of expertise: requirements engineering, business process modeling, IT development etc. Our experience has shown that hierarchical ente...
Irina Rychkova, Alain Wegmann
DRM
2006
Springer
15 years 6 months ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
FINTAL
2006
15 years 6 months ago
Using Alignment Templates to Infer Shallow-Transfer Machine Translation Rules
When building rule-based machine translation systems, a considerable human effort is needed to code the transfer rules that are able to translate source-language sentences into gra...
Felipe Sánchez-Martínez, Hermann Ney