咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 11 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 20 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 9 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
  • 1 篇 理学
    • 1 篇 地球物理学

主题

  • 24 篇 source code tran...
  • 3 篇 software enginee...
  • 2 篇 llvm
  • 2 篇 debugger
  • 2 篇 source code anal...
  • 2 篇 compiler
  • 2 篇 security
  • 2 篇 uncertainty
  • 2 篇 memory exploitat...
  • 2 篇 k-variant archit...
  • 2 篇 java language
  • 2 篇 evolutionary com...
  • 1 篇 runtime
  • 1 篇 reliability
  • 1 篇 scripting langua...
  • 1 篇 software debuggi...
  • 1 篇 c
  • 1 篇 program slicing
  • 1 篇 task analysis
  • 1 篇 code and data pa...

机构

  • 1 篇 fdn bruno kessle...
  • 1 篇 univ lille campu...
  • 1 篇 kobe univ nada k...
  • 1 篇 univ tokyo bunky...
  • 1 篇 lawrence livermo...
  • 1 篇 univ novi sad fa...
  • 1 篇 univ arizona tuc...
  • 1 篇 kobe univ grad s...
  • 1 篇 siksha o anusand...
  • 1 篇 konan univ higas...
  • 1 篇 vrije univ bruss...
  • 1 篇 iit dept comp sc...
  • 1 篇 iit il 60616 usa
  • 1 篇 univ lille inria...
  • 1 篇 university of ox...
  • 1 篇 ecole mines nant...
  • 1 篇 univ calif irvin...
  • 1 篇 coll engn pune m...
  • 1 篇 grun software ag...
  • 1 篇 univ twente soft...

作者

  • 2 篇 aragon-jurado jo...
  • 2 篇 bekiroglu berk
  • 2 篇 de la torre juan...
  • 2 篇 korel bogdan
  • 2 篇 nitta naoya
  • 2 篇 kume izuru
  • 2 篇 ruiz patricia
  • 2 篇 nakamura masahid...
  • 2 篇 dorronsoro berna...
  • 1 篇 yoshida norihiro
  • 1 篇 etsuya shibayama
  • 1 篇 masahide nakamur...
  • 1 篇 monperrus martin
  • 1 篇 havas david
  • 1 篇 richter h.
  • 1 篇 ran ettinger
  • 1 篇 tonella paolo
  • 1 篇 robinson brian p...
  • 1 篇 inoue katsuro
  • 1 篇 zomaya albert y.

语言

  • 24 篇 英文
检索条件"主题词=Source Code Transformation"
24 条 记 录,以下是1-10 订阅
排序:
Experimental evaluation of a tool for the verification and transformation of source code in event-driven systems
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2009年 第6期14卷 720-777页
作者: Gulesir, Gurcan van den Berg, Klaas Bergmans, Lodewijk Aksit, Mehmet Univ Twente Dept Comp Sci NL-7500 AE Enschede Netherlands Univ Twente Software Engn Grp NL-7500 AE Enschede Netherlands
In event-driven systems, separating the reactive part of software (i.e., event-driven control) from the non-reactive part is a common design practice. The reactive part is typically structured according to the states ... 详细信息
来源: 评论
Automatic software tailoring for Green Internet of Things
收藏 引用
INTERNET OF THINGS 2025年 30卷
作者: Aragon-Jurado, Jose Miguel de la Torre, Juan Carlos Ruiz, Patricia Dorronsoro, Bernabe Univ Cadiz Sch Engn Puerto Real Spain
The proliferation of low-capacity, interconnected Internet of Things devices has increased the need for energy efficient software. Optimizing software performance for specific hardware requires tailored code transform... 详细信息
来源: 评论
source code transformations for Improving Security of Time-bounded K-variant Systems
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2021年 137卷 106601-106601页
作者: Bekiroglu, Berk Korel, Bogdan IIT Chicago IL 60616 USA
Context: source code transformation techniques can improve the security of systems against memory exploitation attacks. As such, the chance of exploitation of security vulnerabilities can be decreased by using differe... 详细信息
来源: 评论
code and data structure partitioning for parallel and flexible MPSoC specification using designer-controlled recoding
收藏 引用
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 2008年 第6期27卷 1078-1090页
作者: Chandraiah, Pramod Doemer, Rainer Univ Calif Irvine Irvine CA 92697 USA
MultiProcessor Systems-on-Chip (MPSoCs) are increasingly being used to build efficient and cost-effective embedded systems that meet the necessary real-time requirements. However, programming heterogeneous MPSoCs is h... 详细信息
来源: 评论
Trading-off security and performance in barrier slicing for remote software entrusting
收藏 引用
AUTOMATED SOFTWARE ENGINEERING 2009年 第2期16卷 235-261页
作者: Ceccato, Mariano Preda, Mila Dalla Nagra, Jasvir Collberg, Christian Tonella, Paolo Fdn Bruno Kessler Trento Italy Univ Trent Trento Italy Univ Arizona Tucson AZ USA
Network applications often require that a trust relationship is established between a trusted host (e.g., the server) and an untrusted host (e.g., the client). The remote entrusting problem is the problem of ensuring ... 详细信息
来源: 评论
Survivability Analysis of K-Variant Architecture for Different Memory Attacks and Defense Strategies
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021年 第4期18卷 1868-1881页
作者: Bekiroglu, Berk Korel, Bogdan IIT Dept Comp Sci Chicago IL 60616 USA
Many systems require high security during a limited operational timeframe. These systems can be exposed to many attacks that prevent tasks from being completed. To reduce the chances of a successful attack and increas... 详细信息
来源: 评论
Automatic Software Tailoring for Optimal Performance
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING
收藏 引用
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING 2024年 第3期9卷 464-481页
作者: Aragon-Jurado, Jose Miguel de la Torre, Juan Carlos Ruiz, Patricia Galindo, Pedro L. Zomaya, Albert Y. Dorronsoro, Bernabe Univ Cadiz Cadiz 11003 Spain Univ Cadiz Intelligent Syst Grp Cadiz 11003 Spain Univ Sydney Ctr Distributed & High Performance Comp Camperdown NSW 2050 Australia Univ Sydney Camperdown NSW 2050 Australia
Efficient green software solutions require being aware of the characteristics of both the software and the hardware where it is executed. Separately optimizing them leads to inefficient results, and there is a need fo... 详细信息
来源: 评论
Transforming MPI source code based on communication patterns
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2010年 第1期26卷 147-154页
作者: Preissl, Robert Schulz, Martin Kranzlmueller, Dieter de Supinski, Bronis R. Quinlan, Daniel J. Johannes Kepler Univ Linz GUP Dept Graph & Parallel Proc Linz Austria Lawrence Livermore Natl Lab CASC Comp Sci Grp Livermore CA USA Lawrence Livermore Natl Lab ADEPT Adv Simulat & Comp Program Livermore CA USA Univ Munich Dept Comp Sci Munich Germany Bavarian Acad Sci Leibniz Supercomp Ctr LRZ Garching Germany
A high-level understanding of communication behavior can facilitate performance optimization of HPC applications. In particular, MPI communication patterns can serve as the basis of code transformations that substitut... 详细信息
来源: 评论
SPOON: A library for implementing analyses and transformations of Java source code
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2016年 第9期46卷 1155-1179页
作者: Pawlak, Renaud Monperrus, Martin Petitprez, Nicolas Noguera, Carlos Seinturier, Lionel Cincheo Paris France Univ Lille Campus Sci F-59655 Villeneuve Dascq France Inria F-59650 Villeneuve Dascq France Vrije Univ Brussel B-1050 Brussels Belgium
This paper presents SPOON, a library for the analysis and transformation of Java source code. SPOON enables Java developers to write a large range of domain-specific analyses and transformations in an easy and concise... 详细信息
来源: 评论
Mechanisms for source code Obfuscation in C: Novel Techniques and Implementation  2
Mechanisms for Source Code Obfuscation in C: Novel Technique...
收藏 引用
2nd IEEE International Conference on Emerging Smart Computing and Informatics (ESCI)
作者: Ahire, Pallavi Abraham, Jibi Savitribai Phule Pune Univ Dept Technol Pune Maharashtra India Coll Engn Pune Maharashtra India
Due to exponential growth of internet, there is abundant assistance available online to learn programming languages much more efficiently. Most of the programmers use this valuable knowledge for the constructive purpo... 详细信息
来源: 评论