Sciweavers

1821 search results - page 40 / 365
» Security-Aware Program Transformations
Sort
View
122
Voted
LFP
1992
153views more  LFP 1992»
15 years 3 months ago
Reasoning About Programs in Continuation-Passing Style
The CPS transformation dates back to the early 1970's, where it arose as a technique to represent the control flow of programs in -calculus based programming languages as -te...
Amr Sabry, Matthias Felleisen
123
Voted
CCS
2007
ACM
15 years 8 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
148
Voted
TOOLS
1998
IEEE
15 years 6 months ago
Macro Processing in Object-Oriented Languages
There are a number of programmable macro systems such as Lisp's. While they can handle complex program transformation, they still have difficulty in handling some kinds of tr...
Shigeru Chiba
106
Voted
MDAFA
2004
Springer
116views Hardware» more  MDAFA 2004»
15 years 7 months ago
"Weaving" MTL Model Transformations
Model transformations are the core of the MDA approach to software development. As specified by the OMG, model transformations should act on any kind of model of any kind of metamo...
Raul Silaghi, Frédéric Fondement, Al...
OOPSLA
2009
Springer
15 years 6 months ago
MT-scribe: a tool for recording and inferring model transformations
The traditional model transformation approach is to write transformation programs in a specialized language. Although such languages provide powerful capabilities to automate mode...
Yu Sun, Jeff Gray, Jules White