Sciweavers

1821 search results - page 164 / 365
» Security-Aware Program Transformations
Sort
View
VL
2002
IEEE
144views Visual Languages» more  VL 2002»
15 years 7 months ago
Interactive Visualization of Java Programs
The design and implementation of a novel visual interactive execution environment for Java is described. This system displays both the run-time object structure as well as the int...
Paul V. Gestwicki, Bharat Jayaraman
ENTCS
2007
168views more  ENTCS 2007»
15 years 2 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
ICLP
2009
Springer
16 years 2 months ago
Integrating Software Testing and Run-Time Checking in an Assertion Verification Framework
Abstract. We present a framework that unifies unit testing and runtime verification (as well as static verification and static debugging). A key contribution of our overall approac...
Edison Mera, Manuel V. Hermenegildo, Pedro L&oacut...
PLDI
2004
ACM
15 years 7 months ago
KISS: keep it simple and sequential
The design of concurrent programs is error-prone due to the interaction between concurrently executing threads. Traditional automated techniques for finding errors in concurrent ...
Shaz Qadeer, Dinghao Wu
PLILP
1994
Springer
15 years 5 months ago
Deriving Residual Reference Count Garbage Collectors
We present a strategy to derive an efficient reference count garbage collector for any applicative program by only modifying it on the source code level. The key to the approach is...
Wolfram Schulte