This paper presents a compilation framework that allows executable code to be shared across different Java Virtual Machine (JVM) instances. All fully compliant JVMs that target se...
Pramod G. Joisha, Samuel P. Midkiff, Mauricio J. S...
. Steganography is defined as covered writing and it has been used to achieve confidentiality. Most of research in this domain has focused in just sending plain data. In this paper...
Recent years have seen increasing interest in systems that reason about and manipulate executable code. Such systems can generally benefit from information about aliasing. Unfort...
Abstract. Code generators are widely used in the development of embedded software to automatically generate executable code from graphical specifications. However, at present, cod...
The concept of MDA (model driven architecture) aims at the goal of longevity (through business logic and architecture migration between different platforms) and quality improvemen...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...