Sciweavers

1821 search results - page 40 / 365
» Security-Aware Program Transformations
Sort
View
LFP
1992
153views more  LFP 1992»
13 years 10 months ago
Reasoning About Programs in Continuation-Passing Style
The CPS transformation dates back to the early 1970's, where it arose as a technique to represent the control flow of programs in -calculus based programming languages as -te...
Amr Sabry, Matthias Felleisen
CCS
2007
ACM
14 years 3 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
TOOLS
1998
IEEE
14 years 1 months ago
Macro Processing in Object-Oriented Languages
There are a number of programmable macro systems such as Lisp's. While they can handle complex program transformation, they still have difficulty in handling some kinds of tr...
Shigeru Chiba
MDAFA
2004
Springer
116views Hardware» more  MDAFA 2004»
14 years 2 months ago
"Weaving" MTL Model Transformations
Model transformations are the core of the MDA approach to software development. As specified by the OMG, model transformations should act on any kind of model of any kind of metamo...
Raul Silaghi, Frédéric Fondement, Al...
OOPSLA
2009
Springer
14 years 1 months ago
MT-scribe: a tool for recording and inferring model transformations
The traditional model transformation approach is to write transformation programs in a specialized language. Although such languages provide powerful capabilities to automate mode...
Yu Sun, Jeff Gray, Jules White