Sciweavers

3456 search results - page 621 / 692
» Byte Code Engineering
Sort
View
231
Voted

Book
352views
17 years 14 days ago
Object-Oriented Reengineering Patterns
"The documentation is missing or obsolete, and the original developers have departed. Your team has limited understanding of the system, and unit tests are missing for many, i...
Serge Demeyer, Stéphane Ducasse, Oscar Nierstrasz
145
Voted
CVPR
2009
IEEE
1724views Computer Vision» more  CVPR 2009»
16 years 9 months ago
Optimal Single Image Capture for Motion Deblurring
Deblurring images of moving objects captured from a traditional camera is an ill-posed problem due to the loss of high spatial frequencies in the captured images. Recent techniques...
Amit K. Agrawal, Ramesh Raskar
PLDI
2009
ACM
16 years 3 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
120
Voted
PLDI
2010
ACM
15 years 11 months ago
Ur: Statically-Typed Metaprogramming with Type-Level Record Computation
Dependent types provide a strong foundation for specifying and verifying rich properties of programs through type-checking. The earliest implementations combined dependency, which...
Adam Chlipala
EUROSYS
2008
ACM
15 years 11 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos