Sciweavers

330 search results - page 31 / 66
» Reflections on a programming Olympiad
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 11 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
APWEB
2006
Springer
14 years 2 months ago
Querying Composite Events for Reactivity on the Web
Reactivity, the ability to detect events and respond to them automatically through reactive programs, is a key requirement in many present-day information systems. Work on Web Serv...
François Bry, Michael Eckert, Paula-Lavinia...
CSMR
2006
IEEE
14 years 27 days ago
Search-Based Software Maintenance
The high cost of software maintenance could potentially be greatly reduced by the automatic refactoring of object-oriented programs to increase their understandability, adaptabili...
Mark Kent O'Keeffe, Mel Ó Cinnéide
ECOOP
2008
Springer
14 years 21 days ago
Extensible Universes for Object-Oriented Data Models
Abstract We present a datatype package that enables the shallow embedding technique to object-oriented specification and programming languages. This datatype package incrementally ...
Achim D. Brucker, Burkhart Wolff
IASTEDSEA
2004
14 years 10 days ago
A component model for building systems software
OpenCOM v2 is our experimental language-independent component-based systems-building technology. OpenCOM offers more than merely a component-based programming model. First, it is ...
Geoff Coulson, Gordon S. Blair, Paul Grace, Ackbar...