Sciweavers

1821 search results - page 196 / 365
» Security-Aware Program Transformations
Sort
View
AOSD
2004
ACM
14 years 2 months ago
Advice weaving in AspectJ
This paper describes the implementation of advice weaving in AspectJ. The AspectJ language picks out dynamic join points in a program's execution with pointcuts and uses advi...
Erik Hilsdale, Jim Hugunin
LICS
1994
IEEE
14 years 1 months ago
Higher-Order Narrowing
Higher-order narrowing is a general method for higher-order equational reasoning and serves for instance as the foundation for the integration of functional and logic programming. ...
Christian Prehofer
ECOOP
1994
Springer
14 years 1 months ago
Product Configurations - An Application for Prototype Object Approach
Product configuration management is presented as a practical application for a prototype-based object model. Data model requirements for a configuration system are first introduced...
Hannu Peltonen, Tomi Männistö, Kari Alho...
ASPLOS
1992
ACM
14 years 1 months ago
Closing the Window of Vulnerability in Multiphase Memory Transactions
Multiprocessor architects have begun to explore several mechanisms such as prefetching, context-switching and software-assisted dynamic cache-coherence, which transform single-pha...
John Kubiatowicz, David Chaiken, Anant Agarwal
ICALP
2000
Springer
14 years 27 days ago
Average Bit-Complexity of Euclidean Algorithms
Abstract. We obtain new results regarding the precise average bitcomplexity of five algorithms of a broad Euclidean type. We develop a general framework for analysis of algorithms,...
Ali Akhavi, Brigitte Vallée