High-level memory model with low-level pointer cast support for Jessie intermediate language M. U. MandrykinA. V. Khoroshilov OriginalPaper 25 July 2015 Pages: 197 - 207
View to view transformations in domain specific modeling D. V. KoznovE. V. LarchikA. N. Terekhov OriginalPaper 25 July 2015 Pages: 208 - 214
Secure cloud computing based on threshold homomorphic encryption N. P. VarnovskiyS. A. MartishinA. V. Shokurov OriginalPaper 25 July 2015 Pages: 215 - 218
Automated construction of software configuration tables for real-time systems in avionics S. B. UtkinS. V. BatovaI. O. Zharinov OriginalPaper 25 July 2015 Pages: 219 - 223
Associated types and constraint propagation for generic programming in Scala A. Pelenitsyn OriginalPaper 25 July 2015 Pages: 224 - 230
Application of compiler transformations against software vulnerabilities exploitation A. R. NurmukhametovSh. F. KurmangaleevS. S. Gaissaryan OriginalPaper 25 July 2015 Pages: 231 - 236
Interprocedural taint analysis for LLVM-bitcode V. K. KoshelevA. O. IzbyshevI. A. Dudina OriginalPaper 25 July 2015 Pages: 237 - 245