Sciweavers

3456 search results - page 65 / 692
» Byte Code Engineering
Sort
View
APN
2004
Springer
15 years 7 months ago
An Extensible Editor and Simulation Engine for Petri Nets: Renew
Renew is a computer tool that supports the development and execution of object-oriented Petri nets, which include net instances, synchronous channels, and seamless Java integration...
Olaf Kummer, Frank Wienberg, Michael Duvigneau, J&...
103
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
SPIRE
1998
Springer
15 years 6 months ago
Direct Pattern Matching on Compressed Text
We present a fast compression and decompression technique for natural language texts. The novelty is that the exact search can be done on the compressed text directly, using any k...
Edleno Silva de Moura, Gonzalo Navarro, Nivio Zivi...
144
Voted
HPCC
2011
Springer
14 years 1 months ago
Heuristic-Based Techniques for Mapping Irregular Communication Graphs to Mesh Topologies
— Mapping of parallel applications on the network topology is becoming increasingly important on large supercomputers. Topology aware mapping can reduce the hops traveled by mess...
Abhinav Bhatele, Laxmikant V. Kalé
105
Voted
MSR
2009
ACM
15 years 8 months ago
Code siblings: Technical and legal implications of copying code between applications
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...
Daniel M. Germán, Massimiliano Di Penta, Ya...