Sciweavers

1153 search results - page 112 / 231
» Reversing graph transformations
Sort
View
ICSE
2008
IEEE-ACM
16 years 1 months ago
SpyWare: a change-aware development toolset
Our research is driven by the motivation that change must be put in the center, if one wants to understand the complex processes of software evolution. We built a toolset named Sp...
Romain Robbes, Michele Lanza
ICCAD
2008
IEEE
130views Hardware» more  ICCAD 2008»
15 years 9 months ago
Lightweight secure PUFs
— To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs int...
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potk...
90
Voted
ERLANG
2009
ACM
15 years 7 months ago
Cleaning up Erlang code is a dirty job but somebody's gotta do it
This paper describes opportunities for automatically modernizing Erlang applications, cleaning them up, eliminating certain bad smells from their code and occasionally also improv...
Thanassis Avgerinos, Konstantinos F. Sagonas
104
Voted
IWPC
2007
IEEE
15 years 7 months ago
Metrics for Measuring the Effectiveness of Decompilers and Obfuscators
Java developers often use decompilers to aid reverse engineering and obfuscators to prevent it. Decompilers translate low-level class files to Java source and can produce “good...
Nomair A. Naeem, Michael Batchelder, Laurie J. Hen...
100
Voted
ADBIS
2007
Springer
119views Database» more  ADBIS 2007»
15 years 7 months ago
Combining Efficient XML Compression with Query Processing
This paper describes a new XML compression scheme that offers both high compression ratios and short query response time. Its core is a fully reversible transform featuring substit...
Przemyslaw Skibinski, Jakub Swacha