Sciweavers

180 search results - page 29 / 36
» Reversible Computation and Reversible Programming Languages
Sort
View
OOPSLA
2007
Springer
14 years 2 months ago
Detection and correction of design defects in object-oriented designs
Design defects come from poor design choices and have the effect of degrading the quality of object-oriented designs. Therefore, they present opportunities for improvements. Howev...
Naouel Moha
ICSM
2005
IEEE
14 years 1 months ago
Object-Oriented Reengineering: Patterns and Techniques
Surprising as it may seem, many of the early adopters of the object-oriented paradigm already face a number of problems typically encountered in large-scale legacy systems. Softwa...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
GPCE
2005
Springer
14 years 1 months ago
Object-Oriented Reengineering Patterns - An Overview
Successful software systems must be prepared to evolve or they will die. Although object-oriented software systems are built to last, over time they degrade as much as any legacy s...
Oscar Nierstrasz, Stéphane Ducasse, Serge D...
DSN
2008
IEEE
14 years 2 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 4 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...