Sciweavers

1821 search results - page 245 / 365
» Security-Aware Program Transformations
Sort
View
107
Voted
ICFP
2002
ACM
16 years 2 months ago
Monads for incremental computing
This paper presents a monadic approach to incremental computation, suitable for purely functional languages such as Haskell. A program that uses incremental computation is able to...
Magnus Carlsson
POPL
2010
ACM
15 years 11 months ago
A simple, verified validator for software pipelining
Software pipelining is a loop optimization that overlaps the execution of several iterations of a loop to expose more instruction-level parallelism. It can result in first-class p...
Jean-Baptiste Tristan, Xavier Leroy
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
15 years 8 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
NDSS
2008
IEEE
15 years 8 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
VL
2007
IEEE
112views Visual Languages» more  VL 2007»
15 years 8 months ago
Visual Languages: A Matter of Style
This articles submits the thesis that visual data modeling and programming languages are conveniently conceived as rendering, or ‘styling’, of conventional, textual languages....
Sacha Berger, François Bry, Tim Furche, Chr...