Sciweavers

365 search results - page 59 / 73
» Extracting Business Rules from Source Code
Sort
View
OSDI
2008
ACM
15 years 12 months ago
Binary Translation Using Peephole Superoptimizers
We present a new scheme for performing binary translation that produces code comparable to or better than existing binary translators with much less engineering effort. Instead of...
Sorav Bansal, Alex Aiken
PLDI
2012
ACM
13 years 2 months ago
Understanding and detecting real-world performance bugs
Developers frequently use inefficient code sequences that could be fixed by simple patches. These inefficient code sequences can cause significant performance degradation and ...
Guoliang Jin, Linhai Song, Xiaoming Shi, Joel Sche...
ENTCS
2006
183views more  ENTCS 2006»
14 years 11 months ago
Metamodel-Based Model Transformation with Aspect-Oriented Constraints
Model transformation means converting an input model available at the beginning of the transformation process to an output model. A widely used approach to model transformation us...
László Lengyel, Tihamer Levendovszky...
ICDE
2011
IEEE
233views Database» more  ICDE 2011»
14 years 3 months ago
Schema evolution analysis for embedded databases
—Dynamic software updating research efforts have mostly been focused on updating application code and in-memory state. As more and more applications use embedded databases for st...
Shengfeng Wu, Iulian Neamtiu
ENTCS
2007
168views more  ENTCS 2007»
14 years 11 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...