Sciweavers

886 search results - page 73 / 178
» Application of automated environment generation to commercia...
Sort
View
CASES
2010
ACM
13 years 6 months ago
Balancing memory and performance through selective flushing of software code caches
Dynamic binary translators (DBTs) are becoming increasingly important because of their power and flexibility. However, the high memory demands of DBTs present an obstacle for all ...
Apala Guha, Kim M. Hazelwood, Mary Lou Soffa
SAC
2009
ACM
14 years 2 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
COMPSAC
2006
IEEE
14 years 2 months ago
An Approach for Developing Adaptive, Mobile Applications with Separation of Concerns
Modern mobile computing paradigms have set new challenges for the development of distributed mobile applications and services. Because of the variability which characterizes the c...
Nearchos Paspallis, George A. Papadopoulos
APSEC
2003
IEEE
14 years 1 months ago
Selecting Components: a Process for Context-Driven Evaluation
This paper describes a process for selecting and evaluating candidates for component based software engineering. The process is aimed at developers sourcing components from third ...
Valerie Maxville, Chiou Peng Lam, Jocelyn Armarego
SIGSOFT
2007
ACM
14 years 8 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin