Sciweavers

330 search results - page 31 / 66
» Reflections on a programming Olympiad
Sort
View
87
Voted
IJNSEC
2008
150views more  IJNSEC 2008»
14 years 9 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
68
Voted
APWEB
2006
Springer
15 years 1 months ago
Querying Composite Events for Reactivity on the Web
Reactivity, the ability to detect events and respond to them automatically through reactive programs, is a key requirement in many present-day information systems. Work on Web Serv...
François Bry, Michael Eckert, Paula-Lavinia...
CSMR
2006
IEEE
14 years 11 months ago
Search-Based Software Maintenance
The high cost of software maintenance could potentially be greatly reduced by the automatic refactoring of object-oriented programs to increase their understandability, adaptabili...
Mark Kent O'Keeffe, Mel Ó Cinnéide
77
Voted
ECOOP
2008
Springer
14 years 11 months ago
Extensible Universes for Object-Oriented Data Models
Abstract We present a datatype package that enables the shallow embedding technique to object-oriented specification and programming languages. This datatype package incrementally ...
Achim D. Brucker, Burkhart Wolff
IASTEDSEA
2004
14 years 11 months ago
A component model for building systems software
OpenCOM v2 is our experimental language-independent component-based systems-building technology. OpenCOM offers more than merely a component-based programming model. First, it is ...
Geoff Coulson, Gordon S. Blair, Paul Grace, Ackbar...