Sciweavers

1821 search results - page 72 / 365
» Security-Aware Program Transformations
Sort
View
ASPLOS
2009
ACM
14 years 29 days ago
Accelerating phase unwrapping and affine transformations for optical quadrature microscopy using CUDA
Optical Quadrature Microscopy (OQM) is a process which uses phase data to capture information about the sample being studied. OQM is part of an imaging framework developed by the ...
Perhaad Mistry, Sherman Braganza, David R. Kaeli, ...
ICSM
2007
IEEE
14 years 3 months ago
Analysis and Transformation of Idiomatic Crosscutting Concerns in Legacy Software Systems
Legacy software systems often suffer from code quality problems. Maintenance of legacy systems can therefore be costly, and the value of legacy systems may diminish due to a lack ...
Magiel Bruntink
XSYM
2005
Springer
107views Database» more  XSYM 2005»
14 years 2 months ago
Logic Wrappers and XSLT Transformations for Tuples Extraction from HTML
Abstract. Recently it was shown that existing general-purpose inductive logic programming systems are useful for learning wrappers (known as L-wrappers) to extract data from HTML d...
Costin Badica, Amelia Badica
ICISC
2004
122views Cryptology» more  ICISC 2004»
13 years 10 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
GPCE
2009
Springer
14 years 1 months ago
Classifying Java class transformations for pervasive virtualized access
The indirection of object accesses is a common theme for target domains as diverse as transparent distribution, persistence, and program instrumentation. Virtualizing accesses to ...
Phil McGachey, Antony L. Hosking, J. Eliot B. Moss