Sciweavers

540 search results - page 56 / 108
» Protection in Programming-Language Translations
Sort
View
LCTRTS
2004
Springer
15 years 8 months ago
Advanced control flow in Java card programming
Java Card technology simplifies the development of smart card applications by providing a high-level programming language similar to Java. However, the master-slave programming m...
Peng Li, Steve Zdancewic
PADL
2004
Springer
15 years 8 months ago
Improved Compilation of Prolog to C Using Moded Types and Determinism Information
We describe the current status of and provide performance results for a prototype compiler of Prolog to C, ciaocc. ciaocc is novel in that it is designed to accept different kinds...
José F. Morales, Manuel Carro, Manuel V. He...
SARA
2009
Springer
15 years 7 months ago
Rewriting Constraint Models with Metamodels
An important challenge in constraint programming is to rewrite constraint models into executable programs calculating the solutions. This phase of constraint processing may requir...
Raphaël Chenouard, Laurent Granvilliers, Rica...
POPL
1999
ACM
15 years 7 months ago
Software Watermarking: Models and Dynamic Embeddings
Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image. Watermarking an object dis...
Christian S. Collberg, Clark D. Thomborson
TOOLS
1999
IEEE
15 years 7 months ago
Interaction Schemata: Compiling Interactions to Code
Programming object interactions is at the heart of object-oriented programming. To improve reusability of the interactions, it is important to program object interactions generica...
Neeraj Sangal, Edward Farrell, Karl J. Lieberherr,...