Sciweavers

6722 search results - page 1045 / 1345
» Reuse-Conducive Development Environments
Sort
View
PPPJ
2009
ACM
15 years 11 months ago
Lazy continuations for Java virtual machines
Continuations, or ’the rest of the computation’, are a concept that is most often used in the context of functional and dynamic programming languages. Implementations of such ...
Lukas Stadler, Christian Wimmer, Thomas Würth...
SAC
2009
ACM
15 years 11 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 11 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
CP
2009
Springer
15 years 11 months ago
Pin Assignment Using Stochastic Local Search Constraint Programming
Abstract. VLSI chips design is becoming increasingly complex and calling for more and more automation. Many chip design problems can be formulated naturally as constraint problems ...
Bella Dubrov, Haggai Eran, Ari Freund, Edward F. M...
ECOOP
2009
Springer
15 years 11 months ago
Program Metamorphosis
Modern development environments support refactoring by providing atomically behaviour-preserving transformations. While useful, these transformations are limited in three ways: (i)...
Christoph Reichenbach, Devin Coughlin, Amer Diwan
« Prev « First page 1045 / 1345 Last » Next »