Sciweavers

369 search results - page 1 / 74
» Aliasing Models for Mobile Objects
Sort
View
IANDC
2002
53views more  IANDC 2002»
13 years 4 months ago
Aliasing Models for Mobile Objects
Uwe Nestmann, Hans Hüttel, Josva Kleist, Mass...
ECOOP
1998
Springer
13 years 9 months ago
Flexible Alias Protection
Aliasing is endemic in object oriented programming. Because an object can be modified via any alias, object oriented programs are hard to understand, maintain, and analyse. Flexibl...
James Noble, Jan Vitek, John Potter
OOPSLA
2007
Springer
13 years 11 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
OOPSLA
2000
Springer
13 years 8 months ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
CSREAEEE
2006
120views Business» more  CSREAEEE 2006»
13 years 6 months ago
Object Caching Model for Cell Phone Mobile Database
- Inherent limitations of mobile computing environment such as limited bandwidth, limited resourced mobile phones, and instability of wireless environment require summarized mobile...
Khubaib Ahmed Qureshi