Sciweavers

2000 search results - page 290 / 400
» Program Transformation and Proof Transformation
Sort
View
144
Voted
NDSS
2008
IEEE
15 years 10 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
240
Voted
VL
2007
IEEE
112views Visual Languages» more  VL 2007»
15 years 10 months ago
Visual Languages: A Matter of Style
This articles submits the thesis that visual data modeling and programming languages are conveniently conceived as rendering, or ‘styling’, of conventional, textual languages....
Sacha Berger, François Bry, Tim Furche, Chr...
127
Voted
APLAS
2006
ACM
15 years 9 months ago
Automatic Testing of Higher Order Functions
This paper tackles a problem often overlooked in functional programming community: that of testing. Fully automatic test tools like Quickcheck and G∀ST can test first order func...
Pieter W. M. Koopman, Rinus Plasmeijer
128
Voted
ERLANG
2006
ACM
15 years 9 months ago
Dryverl: a flexible Erlang/C binding compiler
This article introduces Dryverl, an Erlang/C binding code r. Dryverl aims at becoming the most abstract, open and efficient tool for implementing any Erlang/C bindings, as either...
Romain Lenglet, Shigeru Chiba
EMSOFT
2005
Springer
15 years 9 months ago
Synchronization of periodic clocks
We propose a programming model dedicated to real-time videostreaming applications for embedded media devices, including highdefinition TVs. This model is built on the synchronous...
Albert Cohen, Marc Duranton, Christine Eisenbeis, ...