Sciweavers

150 search results - page 14 / 30
» Programming by sketching for bit-streaming programs
Sort
View
IH
2007
Springer
15 years 3 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
139
Voted
POPL
2001
ACM
15 years 9 months ago
Type-preserving garbage collectors
By combining existing type systems with standard typebased compilation techniques, we describe how to write strongly typed programs that include a function that acts as a tracing ...
Daniel C. Wang, Andrew W. Appel
ICNS
2008
IEEE
15 years 4 months ago
DiProNN: Distributed Programmable Network Node Architecture
The programmable network approach allows processing of passing user data in a network, which is highly suitable especially for multimedia streams processing. However, programming ...
Tomás Rebok
CP
2000
Springer
15 years 1 months ago
A Constraint-Based Framework for Prototyping Distributed Virtual Applications
Abstract. This paper describes the architecture and implementation of a constraint-based framework for rapid prototyping of distributed applications such as virtual simulations, co...
Vineet Gupta, Lalita Jategaonkar Jagadeesan, Radha...
AOSD
2007
ACM
15 years 1 months ago
A case for explicit join point models for aspect-oriented intermediate languages
Aspect-oriented languages mostly employ implicit languagedefined join point models, where well-defined points in the program are called join points and declarative predicates are ...
Hridesh Rajan