Sciweavers

1821 search results - page 293 / 365
» Security-Aware Program Transformations
Sort
View
138
Voted
IUI
2004
ACM
15 years 10 months ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò
CAISE
2004
Springer
15 years 10 months ago
Object-Process Methodology (OPM) vs. UML - a Code Generation Perspective
Modeling languages have been evolving at a high pace, encouraging the use of automatic code generators for transforming models to programs. Automatic code generators should enable ...
Iris Reinhartz-Berger, Dov Dori
GG
2004
Springer
15 years 10 months ago
Extending Graph Rewriting for Refactoring
Refactorings are transformations that change the structure of a program, while preserving the behavior. The topic has attracted a lot of attention recently, since it is a promising...
Niels Van Eetvelde, Dirk Janssens
IPPS
2003
IEEE
15 years 10 months ago
An Executable Analytical Performance Evaluation Approach for Early Performance Prediction
Percolation has recently been proposed as a key component of an advanced program execution model for future generation high-end machines featuring adaptive data/code transformatio...
Adeline Jacquet, Vincent Janot, Clement Leung, Gua...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 10 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...