Sciweavers

1821 search results - page 62 / 365
» Security-Aware Program Transformations
Sort
View
ECOOPW
1998
Springer
14 years 1 months ago
Program Restructuring to Introduce Design Patterns
In restructuring legacy code it may be useful to introduce a design pattern in order to add clarity to the system and thus facilitate further program evolution. We show that aspec...
Mel Ó Cinnéide, Paddy Nixon
DEBU
1999
85views more  DEBU 1999»
13 years 8 months ago
Specifying Database Transformations in WOL
WOL is a Horn-clause language for specifying transformations involving complex types and recursive data-structures. Its declarative syntax makes programs easy to modify in respons...
Susan B. Davidson, Anthony Kosky
ICSE
2001
IEEE-ACM
14 years 1 months ago
Using Transformation Systems for Software Maintenance and Reengineering
Software maintenance costs dominate software engineering costs, partly because most such engineering is done manually. Program Transformation tools leverage an engineer-provided b...
Ira D. Baxter
GPCE
2004
Springer
14 years 2 months ago
Compiling Process Graphs into Executable Code
Abstract. Model-driven architecture envisions a paradigm shift as dramatic as the one from low-level assembler languages to high-level programming languages. In order for this visi...
Rainer Hauser, Jana Koehler
IFIP
2009
Springer
14 years 3 months ago
Transformations between Cryptographic Protocols
Abstract. A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformati...
Joshua D. Guttman