Sciweavers

1821 search results - page 164 / 365
» Security-Aware Program Transformations
Sort
View
VL
2002
IEEE
144views Visual Languages» more  VL 2002»
14 years 2 months ago
Interactive Visualization of Java Programs
The design and implementation of a novel visual interactive execution environment for Java is described. This system displays both the run-time object structure as well as the int...
Paul V. Gestwicki, Bharat Jayaraman
ENTCS
2007
168views more  ENTCS 2007»
13 years 9 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
ICLP
2009
Springer
14 years 9 months ago
Integrating Software Testing and Run-Time Checking in an Assertion Verification Framework
Abstract. We present a framework that unifies unit testing and runtime verification (as well as static verification and static debugging). A key contribution of our overall approac...
Edison Mera, Manuel V. Hermenegildo, Pedro L&oacut...
PLDI
2004
ACM
14 years 2 months ago
KISS: keep it simple and sequential
The design of concurrent programs is error-prone due to the interaction between concurrently executing threads. Traditional automated techniques for finding errors in concurrent ...
Shaz Qadeer, Dinghao Wu
PLILP
1994
Springer
14 years 21 days ago
Deriving Residual Reference Count Garbage Collectors
We present a strategy to derive an efficient reference count garbage collector for any applicative program by only modifying it on the source code level. The key to the approach is...
Wolfram Schulte