Sciweavers

2257 search results - page 371 / 452
» Secure program partitioning
Sort
View
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
14 years 2 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
OOPSLA
2005
Springer
14 years 2 months ago
fmp and fmp2rsm: eclipse plug-ins for modeling features using model templates
Feature-based model templates have been proposed as a technique for modeling software product lines. We describe a set of tools supporting the technique, namely a feature model ed...
Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan...
OOPSLA
2005
Springer
14 years 2 months ago
Inferring context-free grammars for domain-specific languages
Grammatical inference (or grammar inference) has been applied to various problems in areas such as computational biology, and speech and pattern recognition but its application to...
Faizan Javed
OOPSLA
2005
Springer
14 years 2 months ago
Pluggable AOP: designing aspect mechanisms for third-party composition
Studies of Aspect-Oriented Programming (AOP) usually focus on a language in which a specific aspect extension is integrated with a base language. Languages specified in this man...
Sergei Kojarski, David H. Lorenz
SOFSEM
2005
Springer
14 years 2 months ago
Tier Aspect Model Based on Updatable Views
The tier aspect model addresses Aspect Oriented Programming (AOP) in the context of database applications. It is a new technique of separation of concerns through tiers implemented...
Radoslaw Adamus, Kazimierz Subieta