Sciweavers

890 search results - page 55 / 178
» Programming language methods in computer security
Sort
View
PEPM
2010
ACM
14 years 7 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
ICALT
2003
IEEE
14 years 3 months ago
Online Self-Assessment as a Learning Method
Algorithms and Programming Languages is a core subject in the BS Degree in Mathematics at the authors’ university. Some of the students are very interested in computer programmi...
Daniel Gayo-Avello, Hortensia Fernández-Cue...
SOFSEM
2010
Springer
14 years 7 months ago
Source Code Rejuvenation Is Not Refactoring
Programmers rely on programming idioms, design patterns, and workaround techniques to make up for missing programming language support. Evolving languages often address frequently ...
Peter Pirkelbauer, Damian Dechev, Bjarne Stroustru...
PLDI
2004
ACM
14 years 3 months ago
Cost effective dynamic program slicing
Although dynamic program slicing was first introduced to aid in user level debugging, applications aimed at improving software quality, reliability, security, and performance hav...
Xiangyu Zhang, Rajiv Gupta
VL
2002
IEEE
100views Visual Languages» more  VL 2002»
14 years 2 months ago
Using HCI Techniques to Design a More Usable Programming System
A programming system is the user interface between the programmer and the computer. Programming is a notoriously difficult activity, and some of this difficulty can be attribute...
John F. Pane, Brad A. Myers, Leah B. Miller