Sciweavers

180 search results - page 29 / 36
» Reversible Computation and Reversible Programming Languages
Sort
View
OOPSLA
2007
Springer
15 years 8 months ago
Detection and correction of design defects in object-oriented designs
Design defects come from poor design choices and have the effect of degrading the quality of object-oriented designs. Therefore, they present opportunities for improvements. Howev...
Naouel Moha
ICSM
2005
IEEE
15 years 7 months ago
Object-Oriented Reengineering: Patterns and Techniques
Surprising as it may seem, many of the early adopters of the object-oriented paradigm already face a number of problems typically encountered in large-scale legacy systems. Softwa...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
GPCE
2005
Springer
15 years 7 months ago
Object-Oriented Reengineering Patterns - An Overview
Successful software systems must be prepared to evolve or they will die. Although object-oriented software systems are built to last, over time they degrade as much as any legacy s...
Oscar Nierstrasz, Stéphane Ducasse, Serge D...
DSN
2008
IEEE
15 years 8 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
15 years 10 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...